Jul 16 12:38:52.046726 kernel: Linux version 5.15.188-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Jul 15 10:04:37 -00 2025 Jul 16 12:38:52.046772 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 16 12:38:52.046792 kernel: BIOS-provided physical RAM map: Jul 16 12:38:52.046802 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 16 12:38:52.046812 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 16 12:38:52.046822 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 16 12:38:52.046833 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Jul 16 12:38:52.046844 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Jul 16 12:38:52.046854 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 16 12:38:52.046877 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 16 12:38:52.048909 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 16 12:38:52.048925 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 16 12:38:52.048936 kernel: NX (Execute Disable) protection: active Jul 16 12:38:52.048948 kernel: SMBIOS 2.8 present. Jul 16 12:38:52.048961 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Jul 16 12:38:52.048973 kernel: Hypervisor detected: KVM Jul 16 12:38:52.048990 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 16 12:38:52.049032 kernel: kvm-clock: cpu 0, msr 1419b001, primary cpu clock Jul 16 12:38:52.049052 kernel: kvm-clock: using sched offset of 4907087098 cycles Jul 16 12:38:52.049064 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 16 12:38:52.049075 kernel: tsc: Detected 2499.998 MHz processor Jul 16 12:38:52.049086 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 16 12:38:52.049098 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 16 12:38:52.049109 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Jul 16 12:38:52.049119 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 16 12:38:52.049137 kernel: Using GB pages for direct mapping Jul 16 12:38:52.049148 kernel: ACPI: Early table checksum verification disabled Jul 16 12:38:52.049158 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jul 16 12:38:52.049169 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049180 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049201 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049214 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Jul 16 12:38:52.049225 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049236 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049252 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049263 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:38:52.049274 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Jul 16 12:38:52.049285 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Jul 16 12:38:52.049296 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Jul 16 12:38:52.049307 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Jul 16 12:38:52.049324 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Jul 16 12:38:52.049340 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Jul 16 12:38:52.049351 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Jul 16 12:38:52.049363 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 16 12:38:52.049374 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 16 12:38:52.049386 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Jul 16 12:38:52.049397 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Jul 16 12:38:52.049409 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Jul 16 12:38:52.049424 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Jul 16 12:38:52.049436 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Jul 16 12:38:52.049447 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Jul 16 12:38:52.049459 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Jul 16 12:38:52.049470 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Jul 16 12:38:52.049482 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Jul 16 12:38:52.049494 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Jul 16 12:38:52.049505 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Jul 16 12:38:52.049517 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Jul 16 12:38:52.049528 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Jul 16 12:38:52.049544 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Jul 16 12:38:52.049555 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 16 12:38:52.049567 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 16 12:38:52.049579 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Jul 16 12:38:52.049590 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Jul 16 12:38:52.049602 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Jul 16 12:38:52.049614 kernel: Zone ranges: Jul 16 12:38:52.049626 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 16 12:38:52.049637 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Jul 16 12:38:52.049653 kernel: Normal empty Jul 16 12:38:52.049665 kernel: Movable zone start for each node Jul 16 12:38:52.049676 kernel: Early memory node ranges Jul 16 12:38:52.049688 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 16 12:38:52.049700 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Jul 16 12:38:52.049711 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Jul 16 12:38:52.049723 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 16 12:38:52.049734 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 16 12:38:52.049746 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Jul 16 12:38:52.049761 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 16 12:38:52.049773 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 16 12:38:52.049785 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 16 12:38:52.049800 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 16 12:38:52.049812 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 16 12:38:52.049823 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 16 12:38:52.049835 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 16 12:38:52.049847 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 16 12:38:52.051778 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 16 12:38:52.051808 kernel: TSC deadline timer available Jul 16 12:38:52.051821 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Jul 16 12:38:52.051833 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 16 12:38:52.051845 kernel: Booting paravirtualized kernel on KVM Jul 16 12:38:52.051868 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 16 12:38:52.051895 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Jul 16 12:38:52.051907 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 16 12:38:52.051919 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 16 12:38:52.051931 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jul 16 12:38:52.051948 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Jul 16 12:38:52.051960 kernel: kvm-guest: PV spinlocks enabled Jul 16 12:38:52.051972 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 16 12:38:52.051984 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Jul 16 12:38:52.051996 kernel: Policy zone: DMA32 Jul 16 12:38:52.052009 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 16 12:38:52.052022 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 16 12:38:52.052034 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 16 12:38:52.052050 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 16 12:38:52.052062 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 16 12:38:52.052074 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47476K init, 4104K bss, 192524K reserved, 0K cma-reserved) Jul 16 12:38:52.052086 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jul 16 12:38:52.052098 kernel: Kernel/User page tables isolation: enabled Jul 16 12:38:52.052109 kernel: ftrace: allocating 34607 entries in 136 pages Jul 16 12:38:52.052121 kernel: ftrace: allocated 136 pages with 2 groups Jul 16 12:38:52.052133 kernel: rcu: Hierarchical RCU implementation. Jul 16 12:38:52.052145 kernel: rcu: RCU event tracing is enabled. Jul 16 12:38:52.052161 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jul 16 12:38:52.052173 kernel: Rude variant of Tasks RCU enabled. Jul 16 12:38:52.052186 kernel: Tracing variant of Tasks RCU enabled. Jul 16 12:38:52.052209 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 16 12:38:52.052221 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jul 16 12:38:52.052233 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Jul 16 12:38:52.052245 kernel: random: crng init done Jul 16 12:38:52.052272 kernel: Console: colour VGA+ 80x25 Jul 16 12:38:52.052285 kernel: printk: console [tty0] enabled Jul 16 12:38:52.052297 kernel: printk: console [ttyS0] enabled Jul 16 12:38:52.052309 kernel: ACPI: Core revision 20210730 Jul 16 12:38:52.052321 kernel: APIC: Switch to symmetric I/O mode setup Jul 16 12:38:52.052337 kernel: x2apic enabled Jul 16 12:38:52.052350 kernel: Switched APIC routing to physical x2apic. Jul 16 12:38:52.052362 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Jul 16 12:38:52.052375 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Jul 16 12:38:52.052388 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 16 12:38:52.052404 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 16 12:38:52.052416 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 16 12:38:52.052428 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 16 12:38:52.052441 kernel: Spectre V2 : Mitigation: Retpolines Jul 16 12:38:52.052453 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 16 12:38:52.052465 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Jul 16 12:38:52.052477 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 16 12:38:52.052490 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 16 12:38:52.052501 kernel: MDS: Mitigation: Clear CPU buffers Jul 16 12:38:52.052514 kernel: MMIO Stale Data: Unknown: No mitigations Jul 16 12:38:52.052525 kernel: SRBDS: Unknown: Dependent on hypervisor status Jul 16 12:38:52.052542 kernel: ITS: Mitigation: Aligned branch/return thunks Jul 16 12:38:52.052554 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 16 12:38:52.052566 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 16 12:38:52.052578 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 16 12:38:52.052590 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 16 12:38:52.052603 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 16 12:38:52.052615 kernel: Freeing SMP alternatives memory: 32K Jul 16 12:38:52.052627 kernel: pid_max: default: 32768 minimum: 301 Jul 16 12:38:52.052639 kernel: LSM: Security Framework initializing Jul 16 12:38:52.052651 kernel: SELinux: Initializing. Jul 16 12:38:52.052663 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 16 12:38:52.052681 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 16 12:38:52.052693 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Jul 16 12:38:52.052705 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Jul 16 12:38:52.052718 kernel: signal: max sigframe size: 1776 Jul 16 12:38:52.052730 kernel: rcu: Hierarchical SRCU implementation. Jul 16 12:38:52.052742 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 16 12:38:52.052754 kernel: smp: Bringing up secondary CPUs ... Jul 16 12:38:52.052767 kernel: x86: Booting SMP configuration: Jul 16 12:38:52.052779 kernel: .... node #0, CPUs: #1 Jul 16 12:38:52.052795 kernel: kvm-clock: cpu 1, msr 1419b041, secondary cpu clock Jul 16 12:38:52.052808 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Jul 16 12:38:52.052820 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Jul 16 12:38:52.052832 kernel: smp: Brought up 1 node, 2 CPUs Jul 16 12:38:52.052844 kernel: smpboot: Max logical packages: 16 Jul 16 12:38:52.052857 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Jul 16 12:38:52.052881 kernel: devtmpfs: initialized Jul 16 12:38:52.052894 kernel: x86/mm: Memory block size: 128MB Jul 16 12:38:52.052907 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 16 12:38:52.052919 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jul 16 12:38:52.052937 kernel: pinctrl core: initialized pinctrl subsystem Jul 16 12:38:52.052949 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 16 12:38:52.052961 kernel: audit: initializing netlink subsys (disabled) Jul 16 12:38:52.052974 kernel: audit: type=2000 audit(1752669530.658:1): state=initialized audit_enabled=0 res=1 Jul 16 12:38:52.052986 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 16 12:38:52.052998 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 16 12:38:52.053010 kernel: cpuidle: using governor menu Jul 16 12:38:52.053022 kernel: ACPI: bus type PCI registered Jul 16 12:38:52.053035 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 16 12:38:52.053052 kernel: dca service started, version 1.12.1 Jul 16 12:38:52.053064 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 16 12:38:52.053076 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 16 12:38:52.053089 kernel: PCI: Using configuration type 1 for base access Jul 16 12:38:52.053101 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 16 12:38:52.053113 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 16 12:38:52.053125 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 16 12:38:52.053138 kernel: ACPI: Added _OSI(Module Device) Jul 16 12:38:52.053154 kernel: ACPI: Added _OSI(Processor Device) Jul 16 12:38:52.053166 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 16 12:38:52.053179 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 16 12:38:52.053199 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 16 12:38:52.053213 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 16 12:38:52.053225 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 16 12:38:52.053237 kernel: ACPI: Interpreter enabled Jul 16 12:38:52.053249 kernel: ACPI: PM: (supports S0 S5) Jul 16 12:38:52.053261 kernel: ACPI: Using IOAPIC for interrupt routing Jul 16 12:38:52.053274 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 16 12:38:52.053291 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 16 12:38:52.053303 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 16 12:38:52.053646 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 16 12:38:52.053815 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 16 12:38:52.056890 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 16 12:38:52.056915 kernel: PCI host bridge to bus 0000:00 Jul 16 12:38:52.057083 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 16 12:38:52.057253 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 16 12:38:52.057399 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 16 12:38:52.057553 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Jul 16 12:38:52.057703 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 16 12:38:52.057847 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Jul 16 12:38:52.058014 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 16 12:38:52.058219 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 16 12:38:52.058393 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Jul 16 12:38:52.058593 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Jul 16 12:38:52.058759 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Jul 16 12:38:52.058934 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Jul 16 12:38:52.059127 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 16 12:38:52.059316 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.059486 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Jul 16 12:38:52.059670 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.059828 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Jul 16 12:38:52.060017 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.060178 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Jul 16 12:38:52.060361 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.060565 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Jul 16 12:38:52.060814 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.060993 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Jul 16 12:38:52.061166 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.061345 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Jul 16 12:38:52.061524 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.061703 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Jul 16 12:38:52.065917 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Jul 16 12:38:52.066104 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Jul 16 12:38:52.066338 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 16 12:38:52.066508 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 16 12:38:52.066686 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Jul 16 12:38:52.067902 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Jul 16 12:38:52.068109 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Jul 16 12:38:52.068329 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 16 12:38:52.068513 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 16 12:38:52.068707 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Jul 16 12:38:52.068904 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Jul 16 12:38:52.069089 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 16 12:38:52.069291 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 16 12:38:52.069489 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 16 12:38:52.069648 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Jul 16 12:38:52.069838 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Jul 16 12:38:52.075220 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 16 12:38:52.075398 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 16 12:38:52.075593 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Jul 16 12:38:52.075787 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Jul 16 12:38:52.075977 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Jul 16 12:38:52.076139 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Jul 16 12:38:52.076314 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Jul 16 12:38:52.076499 kernel: pci_bus 0000:02: extended config space not accessible Jul 16 12:38:52.076689 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Jul 16 12:38:52.076885 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Jul 16 12:38:52.077055 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Jul 16 12:38:52.077235 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Jul 16 12:38:52.077414 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Jul 16 12:38:52.077623 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Jul 16 12:38:52.077787 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Jul 16 12:38:52.077978 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Jul 16 12:38:52.078144 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 16 12:38:52.078336 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Jul 16 12:38:52.078548 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Jul 16 12:38:52.078714 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Jul 16 12:38:52.079914 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Jul 16 12:38:52.080097 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 16 12:38:52.080300 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Jul 16 12:38:52.080462 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Jul 16 12:38:52.080627 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 16 12:38:52.080796 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Jul 16 12:38:52.085023 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Jul 16 12:38:52.085209 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 16 12:38:52.085420 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Jul 16 12:38:52.085585 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Jul 16 12:38:52.085746 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 16 12:38:52.085934 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Jul 16 12:38:52.086102 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Jul 16 12:38:52.086290 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 16 12:38:52.086448 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Jul 16 12:38:52.086605 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Jul 16 12:38:52.086761 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 16 12:38:52.086789 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 16 12:38:52.086802 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 16 12:38:52.086816 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 16 12:38:52.086834 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 16 12:38:52.086857 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 16 12:38:52.086883 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 16 12:38:52.086896 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 16 12:38:52.086909 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 16 12:38:52.086922 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 16 12:38:52.086934 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 16 12:38:52.086947 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 16 12:38:52.086960 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 16 12:38:52.086978 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 16 12:38:52.086990 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 16 12:38:52.087003 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 16 12:38:52.087016 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 16 12:38:52.087029 kernel: iommu: Default domain type: Translated Jul 16 12:38:52.087041 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 16 12:38:52.087226 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 16 12:38:52.087388 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 16 12:38:52.087554 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 16 12:38:52.087573 kernel: vgaarb: loaded Jul 16 12:38:52.087586 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 16 12:38:52.087599 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 16 12:38:52.087612 kernel: PTP clock support registered Jul 16 12:38:52.087624 kernel: PCI: Using ACPI for IRQ routing Jul 16 12:38:52.087637 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 16 12:38:52.087649 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 16 12:38:52.087662 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Jul 16 12:38:52.087680 kernel: clocksource: Switched to clocksource kvm-clock Jul 16 12:38:52.087693 kernel: VFS: Disk quotas dquot_6.6.0 Jul 16 12:38:52.087706 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 16 12:38:52.087727 kernel: pnp: PnP ACPI init Jul 16 12:38:52.088002 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 16 12:38:52.088024 kernel: pnp: PnP ACPI: found 5 devices Jul 16 12:38:52.088038 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 16 12:38:52.088050 kernel: NET: Registered PF_INET protocol family Jul 16 12:38:52.088069 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 16 12:38:52.088082 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 16 12:38:52.088099 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 16 12:38:52.088111 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 16 12:38:52.088124 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 16 12:38:52.088136 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 16 12:38:52.088149 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 16 12:38:52.088162 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 16 12:38:52.088175 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 16 12:38:52.088202 kernel: NET: Registered PF_XDP protocol family Jul 16 12:38:52.088364 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Jul 16 12:38:52.088523 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Jul 16 12:38:52.088681 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Jul 16 12:38:52.088838 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Jul 16 12:38:52.089011 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Jul 16 12:38:52.089176 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Jul 16 12:38:52.089348 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Jul 16 12:38:52.089508 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Jul 16 12:38:52.089668 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Jul 16 12:38:52.089824 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Jul 16 12:38:52.100535 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Jul 16 12:38:52.100716 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Jul 16 12:38:52.100918 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Jul 16 12:38:52.101083 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Jul 16 12:38:52.101259 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Jul 16 12:38:52.101460 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Jul 16 12:38:52.101664 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Jul 16 12:38:52.101846 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Jul 16 12:38:52.102044 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Jul 16 12:38:52.102223 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Jul 16 12:38:52.102391 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Jul 16 12:38:52.102548 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Jul 16 12:38:52.102713 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Jul 16 12:38:52.102910 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Jul 16 12:38:52.103095 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Jul 16 12:38:52.103292 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 16 12:38:52.103465 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Jul 16 12:38:52.103638 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Jul 16 12:38:52.103811 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Jul 16 12:38:52.103996 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 16 12:38:52.104165 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Jul 16 12:38:52.104349 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Jul 16 12:38:52.104513 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Jul 16 12:38:52.104688 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 16 12:38:52.104872 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Jul 16 12:38:52.105039 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Jul 16 12:38:52.105221 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Jul 16 12:38:52.105400 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 16 12:38:52.105563 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Jul 16 12:38:52.105735 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Jul 16 12:38:52.105933 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Jul 16 12:38:52.106109 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 16 12:38:52.106293 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Jul 16 12:38:52.106484 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Jul 16 12:38:52.106656 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Jul 16 12:38:52.106826 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 16 12:38:52.107002 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Jul 16 12:38:52.107183 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Jul 16 12:38:52.107370 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Jul 16 12:38:52.107552 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 16 12:38:52.107720 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 16 12:38:52.107895 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 16 12:38:52.108042 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 16 12:38:52.108214 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Jul 16 12:38:52.108378 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 16 12:38:52.108538 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Jul 16 12:38:52.108721 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Jul 16 12:38:52.109001 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Jul 16 12:38:52.109157 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Jul 16 12:38:52.109336 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Jul 16 12:38:52.109501 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Jul 16 12:38:52.109652 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Jul 16 12:38:52.109803 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 16 12:38:52.109994 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Jul 16 12:38:52.110154 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Jul 16 12:38:52.110318 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 16 12:38:52.110482 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Jul 16 12:38:52.110633 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Jul 16 12:38:52.110783 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 16 12:38:52.117599 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Jul 16 12:38:52.117791 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Jul 16 12:38:52.117979 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 16 12:38:52.118252 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Jul 16 12:38:52.118411 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Jul 16 12:38:52.118568 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 16 12:38:52.118734 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Jul 16 12:38:52.118922 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Jul 16 12:38:52.119083 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 16 12:38:52.119264 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Jul 16 12:38:52.119420 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Jul 16 12:38:52.119581 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 16 12:38:52.119602 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 16 12:38:52.119616 kernel: PCI: CLS 0 bytes, default 64 Jul 16 12:38:52.119630 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 16 12:38:52.119653 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Jul 16 12:38:52.119673 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 16 12:38:52.119686 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Jul 16 12:38:52.119700 kernel: Initialise system trusted keyrings Jul 16 12:38:52.119714 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 16 12:38:52.119727 kernel: Key type asymmetric registered Jul 16 12:38:52.119740 kernel: Asymmetric key parser 'x509' registered Jul 16 12:38:52.119753 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 16 12:38:52.119767 kernel: io scheduler mq-deadline registered Jul 16 12:38:52.119780 kernel: io scheduler kyber registered Jul 16 12:38:52.119798 kernel: io scheduler bfq registered Jul 16 12:38:52.120037 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Jul 16 12:38:52.120215 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Jul 16 12:38:52.120377 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.120542 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Jul 16 12:38:52.120703 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Jul 16 12:38:52.120884 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.121059 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Jul 16 12:38:52.121231 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Jul 16 12:38:52.121443 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.121607 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Jul 16 12:38:52.121765 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Jul 16 12:38:52.121948 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.122128 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Jul 16 12:38:52.122306 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Jul 16 12:38:52.122471 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.122635 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Jul 16 12:38:52.122802 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Jul 16 12:38:52.122988 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.123169 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Jul 16 12:38:52.123351 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Jul 16 12:38:52.123515 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.123681 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Jul 16 12:38:52.123842 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Jul 16 12:38:52.124026 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:38:52.124054 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 16 12:38:52.124076 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 16 12:38:52.124090 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 16 12:38:52.124103 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 16 12:38:52.124117 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 16 12:38:52.124130 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 16 12:38:52.124144 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 16 12:38:52.124157 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 16 12:38:52.124345 kernel: rtc_cmos 00:03: RTC can wake from S4 Jul 16 12:38:52.124367 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 16 12:38:52.124517 kernel: rtc_cmos 00:03: registered as rtc0 Jul 16 12:38:52.124675 kernel: rtc_cmos 00:03: setting system clock to 2025-07-16T12:38:51 UTC (1752669531) Jul 16 12:38:52.124829 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Jul 16 12:38:52.124849 kernel: intel_pstate: CPU model not supported Jul 16 12:38:52.129941 kernel: NET: Registered PF_INET6 protocol family Jul 16 12:38:52.129966 kernel: Segment Routing with IPv6 Jul 16 12:38:52.129981 kernel: In-situ OAM (IOAM) with IPv6 Jul 16 12:38:52.129995 kernel: NET: Registered PF_PACKET protocol family Jul 16 12:38:52.130009 kernel: Key type dns_resolver registered Jul 16 12:38:52.130022 kernel: IPI shorthand broadcast: enabled Jul 16 12:38:52.130036 kernel: sched_clock: Marking stable (1020330029, 229285591)->(1542946417, -293330797) Jul 16 12:38:52.130049 kernel: registered taskstats version 1 Jul 16 12:38:52.130063 kernel: Loading compiled-in X.509 certificates Jul 16 12:38:52.130076 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.188-flatcar: c4b3a19d3bd6de5654dc12075428550cf6251289' Jul 16 12:38:52.130093 kernel: Key type .fscrypt registered Jul 16 12:38:52.130107 kernel: Key type fscrypt-provisioning registered Jul 16 12:38:52.130120 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 16 12:38:52.130134 kernel: ima: Allocated hash algorithm: sha1 Jul 16 12:38:52.130147 kernel: ima: No architecture policies found Jul 16 12:38:52.130161 kernel: clk: Disabling unused clocks Jul 16 12:38:52.130174 kernel: Freeing unused kernel image (initmem) memory: 47476K Jul 16 12:38:52.130187 kernel: Write protecting the kernel read-only data: 28672k Jul 16 12:38:52.130212 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 16 12:38:52.130231 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Jul 16 12:38:52.130244 kernel: Run /init as init process Jul 16 12:38:52.130261 kernel: with arguments: Jul 16 12:38:52.130275 kernel: /init Jul 16 12:38:52.130288 kernel: with environment: Jul 16 12:38:52.130301 kernel: HOME=/ Jul 16 12:38:52.130314 kernel: TERM=linux Jul 16 12:38:52.130327 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 16 12:38:52.130352 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 16 12:38:52.130377 systemd[1]: Detected virtualization kvm. Jul 16 12:38:52.130392 systemd[1]: Detected architecture x86-64. Jul 16 12:38:52.130405 systemd[1]: Running in initrd. Jul 16 12:38:52.130419 systemd[1]: No hostname configured, using default hostname. Jul 16 12:38:52.130433 systemd[1]: Hostname set to . Jul 16 12:38:52.130447 systemd[1]: Initializing machine ID from VM UUID. Jul 16 12:38:52.130462 systemd[1]: Queued start job for default target initrd.target. Jul 16 12:38:52.130480 systemd[1]: Started systemd-ask-password-console.path. Jul 16 12:38:52.130494 systemd[1]: Reached target cryptsetup.target. Jul 16 12:38:52.130508 systemd[1]: Reached target paths.target. Jul 16 12:38:52.130522 systemd[1]: Reached target slices.target. Jul 16 12:38:52.130536 systemd[1]: Reached target swap.target. Jul 16 12:38:52.130550 systemd[1]: Reached target timers.target. Jul 16 12:38:52.130564 systemd[1]: Listening on iscsid.socket. Jul 16 12:38:52.130578 systemd[1]: Listening on iscsiuio.socket. Jul 16 12:38:52.130597 systemd[1]: Listening on systemd-journald-audit.socket. Jul 16 12:38:52.130612 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 16 12:38:52.130626 systemd[1]: Listening on systemd-journald.socket. Jul 16 12:38:52.130640 systemd[1]: Listening on systemd-networkd.socket. Jul 16 12:38:52.130655 systemd[1]: Listening on systemd-udevd-control.socket. Jul 16 12:38:52.130673 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 16 12:38:52.130687 systemd[1]: Reached target sockets.target. Jul 16 12:38:52.130702 systemd[1]: Starting kmod-static-nodes.service... Jul 16 12:38:52.130717 systemd[1]: Finished network-cleanup.service. Jul 16 12:38:52.130735 systemd[1]: Starting systemd-fsck-usr.service... Jul 16 12:38:52.130750 systemd[1]: Starting systemd-journald.service... Jul 16 12:38:52.130764 systemd[1]: Starting systemd-modules-load.service... Jul 16 12:38:52.130778 systemd[1]: Starting systemd-resolved.service... Jul 16 12:38:52.130792 systemd[1]: Starting systemd-vconsole-setup.service... Jul 16 12:38:52.130806 systemd[1]: Finished kmod-static-nodes.service. Jul 16 12:38:52.130820 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 16 12:38:52.130849 systemd-journald[201]: Journal started Jul 16 12:38:52.130965 systemd-journald[201]: Runtime Journal (/run/log/journal/de230163e1cd442ba60f0ce37df1c8bf) is 4.7M, max 38.1M, 33.3M free. Jul 16 12:38:52.047434 systemd-modules-load[202]: Inserted module 'overlay' Jul 16 12:38:52.146332 kernel: Bridge firewalling registered Jul 16 12:38:52.099617 systemd-resolved[203]: Positive Trust Anchors: Jul 16 12:38:52.153576 systemd[1]: Started systemd-resolved.service. Jul 16 12:38:52.153633 kernel: audit: type=1130 audit(1752669532.146:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.099640 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 16 12:38:52.163087 systemd[1]: Started systemd-journald.service. Jul 16 12:38:52.163132 kernel: audit: type=1130 audit(1752669532.154:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.099687 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 16 12:38:52.170352 kernel: SCSI subsystem initialized Jul 16 12:38:52.111030 systemd-resolved[203]: Defaulting to hostname 'linux'. Jul 16 12:38:52.132472 systemd-modules-load[202]: Inserted module 'br_netfilter' Jul 16 12:38:52.165614 systemd[1]: Finished systemd-fsck-usr.service. Jul 16 12:38:52.166441 systemd[1]: Finished systemd-vconsole-setup.service. Jul 16 12:38:52.171072 systemd[1]: Reached target nss-lookup.target. Jul 16 12:38:52.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.176565 systemd[1]: Starting dracut-cmdline-ask.service... Jul 16 12:38:52.194588 kernel: audit: type=1130 audit(1752669532.164:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.194622 kernel: audit: type=1130 audit(1752669532.165:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.194641 kernel: audit: type=1130 audit(1752669532.166:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.194659 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 16 12:38:52.192972 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 16 12:38:52.206966 kernel: device-mapper: uevent: version 1.0.3 Jul 16 12:38:52.207001 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 16 12:38:52.206070 systemd-modules-load[202]: Inserted module 'dm_multipath' Jul 16 12:38:52.208054 systemd[1]: Finished systemd-modules-load.service. Jul 16 12:38:52.218284 kernel: audit: type=1130 audit(1752669532.208:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.211255 systemd[1]: Starting systemd-sysctl.service... Jul 16 12:38:52.221064 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 16 12:38:52.227882 kernel: audit: type=1130 audit(1752669532.220:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.230272 systemd[1]: Finished systemd-sysctl.service. Jul 16 12:38:52.236359 kernel: audit: type=1130 audit(1752669532.230:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.231226 systemd[1]: Finished dracut-cmdline-ask.service. Jul 16 12:38:52.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.256632 systemd[1]: Starting dracut-cmdline.service... Jul 16 12:38:52.257423 kernel: audit: type=1130 audit(1752669532.236:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.270345 dracut-cmdline[223]: dracut-dracut-053 Jul 16 12:38:52.273873 dracut-cmdline[223]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 16 12:38:52.362955 kernel: Loading iSCSI transport class v2.0-870. Jul 16 12:38:52.384903 kernel: iscsi: registered transport (tcp) Jul 16 12:38:52.415453 kernel: iscsi: registered transport (qla4xxx) Jul 16 12:38:52.415566 kernel: QLogic iSCSI HBA Driver Jul 16 12:38:52.469481 systemd[1]: Finished dracut-cmdline.service. Jul 16 12:38:52.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.471747 systemd[1]: Starting dracut-pre-udev.service... Jul 16 12:38:52.533013 kernel: raid6: sse2x4 gen() 7606 MB/s Jul 16 12:38:52.550973 kernel: raid6: sse2x4 xor() 4743 MB/s Jul 16 12:38:52.568937 kernel: raid6: sse2x2 gen() 5165 MB/s Jul 16 12:38:52.587002 kernel: raid6: sse2x2 xor() 7873 MB/s Jul 16 12:38:52.604979 kernel: raid6: sse2x1 gen() 5169 MB/s Jul 16 12:38:52.623685 kernel: raid6: sse2x1 xor() 7053 MB/s Jul 16 12:38:52.623800 kernel: raid6: using algorithm sse2x4 gen() 7606 MB/s Jul 16 12:38:52.623819 kernel: raid6: .... xor() 4743 MB/s, rmw enabled Jul 16 12:38:52.625037 kernel: raid6: using ssse3x2 recovery algorithm Jul 16 12:38:52.643916 kernel: xor: automatically using best checksumming function avx Jul 16 12:38:52.764949 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 16 12:38:52.779046 systemd[1]: Finished dracut-pre-udev.service. Jul 16 12:38:52.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.779000 audit: BPF prog-id=7 op=LOAD Jul 16 12:38:52.779000 audit: BPF prog-id=8 op=LOAD Jul 16 12:38:52.781290 systemd[1]: Starting systemd-udevd.service... Jul 16 12:38:52.799067 systemd-udevd[401]: Using default interface naming scheme 'v252'. Jul 16 12:38:52.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.807880 systemd[1]: Started systemd-udevd.service. Jul 16 12:38:52.811963 systemd[1]: Starting dracut-pre-trigger.service... Jul 16 12:38:52.832249 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Jul 16 12:38:52.877331 systemd[1]: Finished dracut-pre-trigger.service. Jul 16 12:38:52.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.879374 systemd[1]: Starting systemd-udev-trigger.service... Jul 16 12:38:52.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:52.983935 systemd[1]: Finished systemd-udev-trigger.service. Jul 16 12:38:53.086190 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Jul 16 12:38:53.142175 kernel: cryptd: max_cpu_qlen set to 1000 Jul 16 12:38:53.142213 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 16 12:38:53.142235 kernel: GPT:17805311 != 125829119 Jul 16 12:38:53.142257 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 16 12:38:53.142285 kernel: GPT:17805311 != 125829119 Jul 16 12:38:53.142303 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 16 12:38:53.142325 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:38:53.142348 kernel: AVX version of gcm_enc/dec engaged. Jul 16 12:38:53.142366 kernel: AES CTR mode by8 optimization enabled Jul 16 12:38:53.164910 kernel: ACPI: bus type USB registered Jul 16 12:38:53.165049 kernel: usbcore: registered new interface driver usbfs Jul 16 12:38:53.165078 kernel: usbcore: registered new interface driver hub Jul 16 12:38:53.165102 kernel: usbcore: registered new device driver usb Jul 16 12:38:53.170884 kernel: libata version 3.00 loaded. Jul 16 12:38:53.187741 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 16 12:38:53.283241 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (446) Jul 16 12:38:53.283289 kernel: ahci 0000:00:1f.2: version 3.0 Jul 16 12:38:53.283641 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 16 12:38:53.283676 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 16 12:38:53.283873 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 16 12:38:53.284090 kernel: scsi host0: ahci Jul 16 12:38:53.284353 kernel: scsi host1: ahci Jul 16 12:38:53.284555 kernel: scsi host2: ahci Jul 16 12:38:53.284775 kernel: scsi host3: ahci Jul 16 12:38:53.285031 kernel: scsi host4: ahci Jul 16 12:38:53.285249 kernel: scsi host5: ahci Jul 16 12:38:53.285457 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Jul 16 12:38:53.285479 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Jul 16 12:38:53.285496 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Jul 16 12:38:53.285544 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Jul 16 12:38:53.285570 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Jul 16 12:38:53.285587 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Jul 16 12:38:53.284721 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 16 12:38:53.290388 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 16 12:38:53.299432 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 16 12:38:53.308523 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 16 12:38:53.310833 systemd[1]: Starting disk-uuid.service... Jul 16 12:38:53.318677 disk-uuid[528]: Primary Header is updated. Jul 16 12:38:53.318677 disk-uuid[528]: Secondary Entries is updated. Jul 16 12:38:53.318677 disk-uuid[528]: Secondary Header is updated. Jul 16 12:38:53.322898 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:38:53.328904 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:38:53.524910 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 16 12:38:53.525038 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 16 12:38:53.534908 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 16 12:38:53.534965 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jul 16 12:38:53.536893 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 16 12:38:53.541882 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 16 12:38:53.548817 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Jul 16 12:38:53.572249 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Jul 16 12:38:53.572515 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Jul 16 12:38:53.572704 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Jul 16 12:38:53.572907 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Jul 16 12:38:53.573103 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Jul 16 12:38:53.573299 kernel: hub 1-0:1.0: USB hub found Jul 16 12:38:53.573542 kernel: hub 1-0:1.0: 4 ports detected Jul 16 12:38:53.573745 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Jul 16 12:38:53.573982 kernel: hub 2-0:1.0: USB hub found Jul 16 12:38:53.574205 kernel: hub 2-0:1.0: 4 ports detected Jul 16 12:38:53.809141 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Jul 16 12:38:53.950897 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 16 12:38:53.959174 kernel: usbcore: registered new interface driver usbhid Jul 16 12:38:53.959219 kernel: usbhid: USB HID core driver Jul 16 12:38:53.965973 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Jul 16 12:38:53.969887 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Jul 16 12:38:54.334908 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:38:54.335466 disk-uuid[529]: The operation has completed successfully. Jul 16 12:38:54.399591 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 16 12:38:54.399764 systemd[1]: Finished disk-uuid.service. Jul 16 12:38:54.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.405922 systemd[1]: Starting verity-setup.service... Jul 16 12:38:54.425890 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Jul 16 12:38:54.484547 systemd[1]: Found device dev-mapper-usr.device. Jul 16 12:38:54.488731 systemd[1]: Mounting sysusr-usr.mount... Jul 16 12:38:54.491849 systemd[1]: Finished verity-setup.service. Jul 16 12:38:54.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.591947 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 16 12:38:54.592646 systemd[1]: Mounted sysusr-usr.mount. Jul 16 12:38:54.594380 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 16 12:38:54.596806 systemd[1]: Starting ignition-setup.service... Jul 16 12:38:54.599353 systemd[1]: Starting parse-ip-for-networkd.service... Jul 16 12:38:54.618462 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 16 12:38:54.618530 kernel: BTRFS info (device vda6): using free space tree Jul 16 12:38:54.618570 kernel: BTRFS info (device vda6): has skinny extents Jul 16 12:38:54.641093 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 16 12:38:54.650090 systemd[1]: Finished ignition-setup.service. Jul 16 12:38:54.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.652185 systemd[1]: Starting ignition-fetch-offline.service... Jul 16 12:38:54.751078 systemd[1]: Finished parse-ip-for-networkd.service. Jul 16 12:38:54.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.752000 audit: BPF prog-id=9 op=LOAD Jul 16 12:38:54.754602 systemd[1]: Starting systemd-networkd.service... Jul 16 12:38:54.792210 systemd-networkd[709]: lo: Link UP Jul 16 12:38:54.793374 systemd-networkd[709]: lo: Gained carrier Jul 16 12:38:54.795604 systemd-networkd[709]: Enumeration completed Jul 16 12:38:54.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.796461 systemd[1]: Started systemd-networkd.service. Jul 16 12:38:54.797301 systemd[1]: Reached target network.target. Jul 16 12:38:54.801502 systemd[1]: Starting iscsiuio.service... Jul 16 12:38:54.817367 systemd[1]: Started iscsiuio.service. Jul 16 12:38:54.817943 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 16 12:38:54.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.820168 systemd[1]: Starting iscsid.service... Jul 16 12:38:54.828006 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 16 12:38:54.828006 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 16 12:38:54.828006 iscsid[715]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 16 12:38:54.828006 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 16 12:38:54.828006 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 16 12:38:54.828006 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 16 12:38:54.828006 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 16 12:38:54.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.833564 systemd[1]: Started iscsid.service. Jul 16 12:38:54.835255 systemd-networkd[709]: eth0: Link UP Jul 16 12:38:54.835262 systemd-networkd[709]: eth0: Gained carrier Jul 16 12:38:54.835902 systemd[1]: Starting dracut-initqueue.service... Jul 16 12:38:54.848790 ignition[637]: Ignition 2.14.0 Jul 16 12:38:54.848813 ignition[637]: Stage: fetch-offline Jul 16 12:38:54.848960 ignition[637]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:54.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.849032 ignition[637]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:54.853047 systemd[1]: Finished ignition-fetch-offline.service. Jul 16 12:38:54.851528 ignition[637]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:54.855816 systemd[1]: Starting ignition-fetch.service... Jul 16 12:38:54.851692 ignition[637]: parsed url from cmdline: "" Jul 16 12:38:54.851699 ignition[637]: no config URL provided Jul 16 12:38:54.851710 ignition[637]: reading system config file "/usr/lib/ignition/user.ign" Jul 16 12:38:54.851737 ignition[637]: no config at "/usr/lib/ignition/user.ign" Jul 16 12:38:54.861706 systemd-networkd[709]: eth0: DHCPv4 address 10.230.12.146/30, gateway 10.230.12.145 acquired from 10.230.12.145 Jul 16 12:38:54.851748 ignition[637]: failed to fetch config: resource requires networking Jul 16 12:38:54.851959 ignition[637]: Ignition finished successfully Jul 16 12:38:54.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.871593 ignition[720]: Ignition 2.14.0 Jul 16 12:38:54.870958 systemd[1]: Finished dracut-initqueue.service. Jul 16 12:38:54.871604 ignition[720]: Stage: fetch Jul 16 12:38:54.871787 systemd[1]: Reached target remote-fs-pre.target. Jul 16 12:38:54.871837 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:54.872437 systemd[1]: Reached target remote-cryptsetup.target. Jul 16 12:38:54.871891 ignition[720]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:54.873308 systemd[1]: Reached target remote-fs.target. Jul 16 12:38:54.873373 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:54.875990 systemd[1]: Starting dracut-pre-mount.service... Jul 16 12:38:54.873513 ignition[720]: parsed url from cmdline: "" Jul 16 12:38:54.873521 ignition[720]: no config URL provided Jul 16 12:38:54.873531 ignition[720]: reading system config file "/usr/lib/ignition/user.ign" Jul 16 12:38:54.873548 ignition[720]: no config at "/usr/lib/ignition/user.ign" Jul 16 12:38:54.887033 ignition[720]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Jul 16 12:38:54.887090 ignition[720]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Jul 16 12:38:54.890151 ignition[720]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Jul 16 12:38:54.892400 systemd[1]: Finished dracut-pre-mount.service. Jul 16 12:38:54.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.911398 ignition[720]: GET result: OK Jul 16 12:38:54.911592 ignition[720]: parsing config with SHA512: 6d27286568dbf731f69711688a81cf9592db382a424b990f1627298b62ee6b69e10580fb271affe46d834cebb7f0975ed55323dfdf28192c6983426fea23caca Jul 16 12:38:54.925749 unknown[720]: fetched base config from "system" Jul 16 12:38:54.926735 unknown[720]: fetched base config from "system" Jul 16 12:38:54.927553 unknown[720]: fetched user config from "openstack" Jul 16 12:38:54.929007 ignition[720]: fetch: fetch complete Jul 16 12:38:54.929808 ignition[720]: fetch: fetch passed Jul 16 12:38:54.930567 ignition[720]: Ignition finished successfully Jul 16 12:38:54.933259 systemd[1]: Finished ignition-fetch.service. Jul 16 12:38:54.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.935575 systemd[1]: Starting ignition-kargs.service... Jul 16 12:38:54.948651 ignition[735]: Ignition 2.14.0 Jul 16 12:38:54.948673 ignition[735]: Stage: kargs Jul 16 12:38:54.948893 ignition[735]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:54.948986 ignition[735]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:54.950394 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:54.952018 ignition[735]: kargs: kargs passed Jul 16 12:38:54.953271 systemd[1]: Finished ignition-kargs.service. Jul 16 12:38:54.952101 ignition[735]: Ignition finished successfully Jul 16 12:38:54.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.956002 systemd[1]: Starting ignition-disks.service... Jul 16 12:38:54.968949 ignition[740]: Ignition 2.14.0 Jul 16 12:38:54.968970 ignition[740]: Stage: disks Jul 16 12:38:54.969167 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:54.969202 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:54.970560 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:54.972311 ignition[740]: disks: disks passed Jul 16 12:38:54.972377 ignition[740]: Ignition finished successfully Jul 16 12:38:54.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:54.973299 systemd[1]: Finished ignition-disks.service. Jul 16 12:38:54.974216 systemd[1]: Reached target initrd-root-device.target. Jul 16 12:38:54.975355 systemd[1]: Reached target local-fs-pre.target. Jul 16 12:38:54.976683 systemd[1]: Reached target local-fs.target. Jul 16 12:38:54.978046 systemd[1]: Reached target sysinit.target. Jul 16 12:38:54.979305 systemd[1]: Reached target basic.target. Jul 16 12:38:54.981821 systemd[1]: Starting systemd-fsck-root.service... Jul 16 12:38:55.004679 systemd-fsck[747]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks Jul 16 12:38:55.009122 systemd[1]: Finished systemd-fsck-root.service. Jul 16 12:38:55.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:55.011068 systemd[1]: Mounting sysroot.mount... Jul 16 12:38:55.024901 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 16 12:38:55.024987 systemd[1]: Mounted sysroot.mount. Jul 16 12:38:55.025771 systemd[1]: Reached target initrd-root-fs.target. Jul 16 12:38:55.028297 systemd[1]: Mounting sysroot-usr.mount... Jul 16 12:38:55.029624 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 16 12:38:55.030605 systemd[1]: Starting flatcar-openstack-hostname.service... Jul 16 12:38:55.033724 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 16 12:38:55.033768 systemd[1]: Reached target ignition-diskful.target. Jul 16 12:38:55.036656 systemd[1]: Mounted sysroot-usr.mount. Jul 16 12:38:55.038621 systemd[1]: Starting initrd-setup-root.service... Jul 16 12:38:55.046552 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Jul 16 12:38:55.063231 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Jul 16 12:38:55.072302 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Jul 16 12:38:55.084758 initrd-setup-root[782]: cut: /sysroot/etc/gshadow: No such file or directory Jul 16 12:38:55.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:55.152949 systemd[1]: Finished initrd-setup-root.service. Jul 16 12:38:55.156422 systemd[1]: Starting ignition-mount.service... Jul 16 12:38:55.159007 systemd[1]: Starting sysroot-boot.service... Jul 16 12:38:55.170444 bash[801]: umount: /sysroot/usr/share/oem: not mounted. Jul 16 12:38:55.197263 coreos-metadata[753]: Jul 16 12:38:55.197 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 16 12:38:55.198779 ignition[803]: INFO : Ignition 2.14.0 Jul 16 12:38:55.198779 ignition[803]: INFO : Stage: mount Jul 16 12:38:55.200337 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:55.200337 ignition[803]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:55.202747 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:55.204618 ignition[803]: INFO : mount: mount passed Jul 16 12:38:55.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:55.206727 ignition[803]: INFO : Ignition finished successfully Jul 16 12:38:55.205831 systemd[1]: Finished ignition-mount.service. Jul 16 12:38:55.211506 systemd[1]: Finished sysroot-boot.service. Jul 16 12:38:55.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:55.217246 coreos-metadata[753]: Jul 16 12:38:55.217 INFO Fetch successful Jul 16 12:38:55.218192 coreos-metadata[753]: Jul 16 12:38:55.217 INFO wrote hostname srv-uobsc.gb1.brightbox.com to /sysroot/etc/hostname Jul 16 12:38:55.221001 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Jul 16 12:38:55.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:55.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:55.221183 systemd[1]: Finished flatcar-openstack-hostname.service. Jul 16 12:38:55.512458 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 16 12:38:55.525289 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (810) Jul 16 12:38:55.529197 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 16 12:38:55.529317 kernel: BTRFS info (device vda6): using free space tree Jul 16 12:38:55.529339 kernel: BTRFS info (device vda6): has skinny extents Jul 16 12:38:55.537156 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 16 12:38:55.540211 systemd[1]: Starting ignition-files.service... Jul 16 12:38:55.564270 ignition[830]: INFO : Ignition 2.14.0 Jul 16 12:38:55.564270 ignition[830]: INFO : Stage: files Jul 16 12:38:55.566228 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:55.566228 ignition[830]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:55.566228 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:55.569936 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Jul 16 12:38:55.570805 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 16 12:38:55.570805 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 16 12:38:55.574465 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 16 12:38:55.575937 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 16 12:38:55.578335 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 16 12:38:55.577385 unknown[830]: wrote ssh authorized keys file for user: core Jul 16 12:38:55.585818 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 16 12:38:55.587240 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 16 12:38:56.022093 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 16 12:38:56.613469 systemd-networkd[709]: eth0: Gained IPv6LL Jul 16 12:38:57.329283 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 16 12:38:57.331209 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:38:57.338922 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Jul 16 12:38:57.661166 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Jul 16 12:38:58.120969 systemd-networkd[709]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8324:24:19ff:fee6:c92/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8324:24:19ff:fee6:c92/64 assigned by NDisc. Jul 16 12:38:58.120987 systemd-networkd[709]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Jul 16 12:38:59.133756 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:38:59.133756 ignition[830]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 16 12:38:59.133756 ignition[830]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 16 12:38:59.133756 ignition[830]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Jul 16 12:38:59.138646 ignition[830]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Jul 16 12:38:59.155884 kernel: kauditd_printk_skb: 28 callbacks suppressed Jul 16 12:38:59.155965 kernel: audit: type=1130 audit(1752669539.146:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.144773 systemd[1]: Finished ignition-files.service. Jul 16 12:38:59.158498 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 16 12:38:59.158498 ignition[830]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 16 12:38:59.158498 ignition[830]: INFO : files: files passed Jul 16 12:38:59.158498 ignition[830]: INFO : Ignition finished successfully Jul 16 12:38:59.149394 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 16 12:38:59.157267 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 16 12:38:59.160061 systemd[1]: Starting ignition-quench.service... Jul 16 12:38:59.169738 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 16 12:38:59.172025 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 16 12:38:59.178517 kernel: audit: type=1130 audit(1752669539.171:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.173019 systemd[1]: Reached target ignition-complete.target. Jul 16 12:38:59.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.181093 systemd[1]: Starting initrd-parse-etc.service... Jul 16 12:38:59.188919 kernel: audit: type=1130 audit(1752669539.182:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.182230 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 16 12:38:59.194348 kernel: audit: type=1131 audit(1752669539.188:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.182392 systemd[1]: Finished ignition-quench.service. Jul 16 12:38:59.203509 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 16 12:38:59.214808 kernel: audit: type=1130 audit(1752669539.203:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.214877 kernel: audit: type=1131 audit(1752669539.203:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.203681 systemd[1]: Finished initrd-parse-etc.service. Jul 16 12:38:59.204695 systemd[1]: Reached target initrd-fs.target. Jul 16 12:38:59.215434 systemd[1]: Reached target initrd.target. Jul 16 12:38:59.223092 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 16 12:38:59.224758 systemd[1]: Starting dracut-pre-pivot.service... Jul 16 12:38:59.241558 systemd[1]: Finished dracut-pre-pivot.service. Jul 16 12:38:59.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.249318 kernel: audit: type=1130 audit(1752669539.241:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.248158 systemd[1]: Starting initrd-cleanup.service... Jul 16 12:38:59.261820 systemd[1]: Stopped target nss-lookup.target. Jul 16 12:38:59.263531 systemd[1]: Stopped target remote-cryptsetup.target. Jul 16 12:38:59.278768 systemd[1]: Stopped target timers.target. Jul 16 12:38:59.280308 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 16 12:38:59.281280 systemd[1]: Stopped dracut-pre-pivot.service. Jul 16 12:38:59.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.282976 systemd[1]: Stopped target initrd.target. Jul 16 12:38:59.289228 kernel: audit: type=1131 audit(1752669539.281:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.289476 systemd[1]: Stopped target basic.target. Jul 16 12:38:59.290368 systemd[1]: Stopped target ignition-complete.target. Jul 16 12:38:59.291165 systemd[1]: Stopped target ignition-diskful.target. Jul 16 12:38:59.292485 systemd[1]: Stopped target initrd-root-device.target. Jul 16 12:38:59.293857 systemd[1]: Stopped target remote-fs.target. Jul 16 12:38:59.295224 systemd[1]: Stopped target remote-fs-pre.target. Jul 16 12:38:59.296545 systemd[1]: Stopped target sysinit.target. Jul 16 12:38:59.297739 systemd[1]: Stopped target local-fs.target. Jul 16 12:38:59.299231 systemd[1]: Stopped target local-fs-pre.target. Jul 16 12:38:59.300365 systemd[1]: Stopped target swap.target. Jul 16 12:38:59.308016 kernel: audit: type=1131 audit(1752669539.301:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.301513 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 16 12:38:59.301769 systemd[1]: Stopped dracut-pre-mount.service. Jul 16 12:38:59.315339 kernel: audit: type=1131 audit(1752669539.309:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.303042 systemd[1]: Stopped target cryptsetup.target. Jul 16 12:38:59.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.308745 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 16 12:38:59.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.309056 systemd[1]: Stopped dracut-initqueue.service. Jul 16 12:38:59.310255 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 16 12:38:59.310478 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 16 12:38:59.316280 systemd[1]: ignition-files.service: Deactivated successfully. Jul 16 12:38:59.316497 systemd[1]: Stopped ignition-files.service. Jul 16 12:38:59.319157 systemd[1]: Stopping ignition-mount.service... Jul 16 12:38:59.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.327084 systemd[1]: Stopping iscsiuio.service... Jul 16 12:38:59.327689 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 16 12:38:59.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.327885 systemd[1]: Stopped kmod-static-nodes.service. Jul 16 12:38:59.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.332028 systemd[1]: Stopping sysroot-boot.service... Jul 16 12:38:59.332912 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 16 12:38:59.333119 systemd[1]: Stopped systemd-udev-trigger.service. Jul 16 12:38:59.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.334442 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 16 12:38:59.334598 systemd[1]: Stopped dracut-pre-trigger.service. Jul 16 12:38:59.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.340606 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 16 12:38:59.349933 ignition[868]: INFO : Ignition 2.14.0 Jul 16 12:38:59.349933 ignition[868]: INFO : Stage: umount Jul 16 12:38:59.349933 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:38:59.349933 ignition[868]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:38:59.349933 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:38:59.343121 systemd[1]: Stopped iscsiuio.service. Jul 16 12:38:59.355577 ignition[868]: INFO : umount: umount passed Jul 16 12:38:59.355577 ignition[868]: INFO : Ignition finished successfully Jul 16 12:38:59.347034 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 16 12:38:59.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.347176 systemd[1]: Finished initrd-cleanup.service. Jul 16 12:38:59.358025 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 16 12:38:59.358177 systemd[1]: Stopped ignition-mount.service. Jul 16 12:38:59.359107 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 16 12:38:59.359182 systemd[1]: Stopped ignition-disks.service. Jul 16 12:38:59.359804 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 16 12:38:59.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.359978 systemd[1]: Stopped ignition-kargs.service. Jul 16 12:38:59.360624 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 16 12:38:59.360686 systemd[1]: Stopped ignition-fetch.service. Jul 16 12:38:59.361334 systemd[1]: Stopped target network.target. Jul 16 12:38:59.361985 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 16 12:38:59.362081 systemd[1]: Stopped ignition-fetch-offline.service. Jul 16 12:38:59.362751 systemd[1]: Stopped target paths.target. Jul 16 12:38:59.363330 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 16 12:38:59.368042 systemd[1]: Stopped systemd-ask-password-console.path. Jul 16 12:38:59.368790 systemd[1]: Stopped target slices.target. Jul 16 12:38:59.369376 systemd[1]: Stopped target sockets.target. Jul 16 12:38:59.370042 systemd[1]: iscsid.socket: Deactivated successfully. Jul 16 12:38:59.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.370087 systemd[1]: Closed iscsid.socket. Jul 16 12:38:59.370668 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 16 12:38:59.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.370725 systemd[1]: Closed iscsiuio.socket. Jul 16 12:38:59.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.385000 audit: BPF prog-id=6 op=UNLOAD Jul 16 12:38:59.371312 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 16 12:38:59.371375 systemd[1]: Stopped ignition-setup.service. Jul 16 12:38:59.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.372794 systemd[1]: Stopping systemd-networkd.service... Jul 16 12:38:59.374550 systemd[1]: Stopping systemd-resolved.service... Jul 16 12:38:59.375933 systemd-networkd[709]: eth0: DHCPv6 lease lost Jul 16 12:38:59.378737 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 16 12:38:59.390000 audit: BPF prog-id=9 op=UNLOAD Jul 16 12:38:59.381716 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 16 12:38:59.382038 systemd[1]: Stopped systemd-resolved.service. Jul 16 12:38:59.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.383774 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 16 12:38:59.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.383971 systemd[1]: Stopped systemd-networkd.service. Jul 16 12:38:59.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.385507 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 16 12:38:59.385646 systemd[1]: Stopped sysroot-boot.service. Jul 16 12:38:59.386644 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 16 12:38:59.386707 systemd[1]: Closed systemd-networkd.socket. Jul 16 12:38:59.387750 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 16 12:38:59.387822 systemd[1]: Stopped initrd-setup-root.service. Jul 16 12:38:59.390092 systemd[1]: Stopping network-cleanup.service... Jul 16 12:38:59.393284 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 16 12:38:59.393356 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 16 12:38:59.394745 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 16 12:38:59.394811 systemd[1]: Stopped systemd-sysctl.service. Jul 16 12:38:59.396541 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 16 12:38:59.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.396602 systemd[1]: Stopped systemd-modules-load.service. Jul 16 12:38:59.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.397600 systemd[1]: Stopping systemd-udevd.service... Jul 16 12:38:59.406786 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 16 12:38:59.412041 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 16 12:38:59.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.412230 systemd[1]: Stopped network-cleanup.service. Jul 16 12:38:59.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.414277 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 16 12:38:59.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.414486 systemd[1]: Stopped systemd-udevd.service. Jul 16 12:38:59.415635 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 16 12:38:59.415706 systemd[1]: Closed systemd-udevd-control.socket. Jul 16 12:38:59.416617 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 16 12:38:59.416681 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 16 12:38:59.418109 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 16 12:38:59.418189 systemd[1]: Stopped dracut-pre-udev.service. Jul 16 12:38:59.419718 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 16 12:38:59.419794 systemd[1]: Stopped dracut-cmdline.service. Jul 16 12:38:59.421016 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 16 12:38:59.421082 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 16 12:38:59.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.423659 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 16 12:38:59.447372 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 16 12:38:59.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.447545 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 16 12:38:59.450251 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 16 12:38:59.450418 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 16 12:38:59.452135 systemd[1]: Reached target initrd-switch-root.target. Jul 16 12:38:59.454722 systemd[1]: Starting initrd-switch-root.service... Jul 16 12:38:59.473881 systemd[1]: Switching root. Jul 16 12:38:59.498670 iscsid[715]: iscsid shutting down. Jul 16 12:38:59.499674 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Jul 16 12:38:59.499781 systemd-journald[201]: Journal stopped Jul 16 12:39:03.794684 kernel: SELinux: Class mctp_socket not defined in policy. Jul 16 12:39:03.794929 kernel: SELinux: Class anon_inode not defined in policy. Jul 16 12:39:03.794971 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 16 12:39:03.795004 kernel: SELinux: policy capability network_peer_controls=1 Jul 16 12:39:03.795032 kernel: SELinux: policy capability open_perms=1 Jul 16 12:39:03.795060 kernel: SELinux: policy capability extended_socket_class=1 Jul 16 12:39:03.795105 kernel: SELinux: policy capability always_check_network=0 Jul 16 12:39:03.795131 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 16 12:39:03.795150 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 16 12:39:03.795173 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 16 12:39:03.795200 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 16 12:39:03.795227 systemd[1]: Successfully loaded SELinux policy in 64.551ms. Jul 16 12:39:03.795287 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.926ms. Jul 16 12:39:03.795321 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 16 12:39:03.795356 systemd[1]: Detected virtualization kvm. Jul 16 12:39:03.795396 systemd[1]: Detected architecture x86-64. Jul 16 12:39:03.795424 systemd[1]: Detected first boot. Jul 16 12:39:03.795446 systemd[1]: Hostname set to . Jul 16 12:39:03.795479 systemd[1]: Initializing machine ID from VM UUID. Jul 16 12:39:03.795511 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 16 12:39:03.795538 systemd[1]: Populated /etc with preset unit settings. Jul 16 12:39:03.795564 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:39:03.795610 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:39:03.795646 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:39:03.795688 systemd[1]: iscsid.service: Deactivated successfully. Jul 16 12:39:03.795722 systemd[1]: Stopped iscsid.service. Jul 16 12:39:03.795749 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 16 12:39:03.795776 systemd[1]: Stopped initrd-switch-root.service. Jul 16 12:39:03.795797 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 16 12:39:03.795823 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 16 12:39:03.795850 systemd[1]: Created slice system-addon\x2drun.slice. Jul 16 12:39:03.795931 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 16 12:39:03.795963 systemd[1]: Created slice system-getty.slice. Jul 16 12:39:03.795998 systemd[1]: Created slice system-modprobe.slice. Jul 16 12:39:03.796021 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 16 12:39:03.796041 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 16 12:39:03.796061 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 16 12:39:03.796081 systemd[1]: Created slice user.slice. Jul 16 12:39:03.796102 systemd[1]: Started systemd-ask-password-console.path. Jul 16 12:39:03.796123 systemd[1]: Started systemd-ask-password-wall.path. Jul 16 12:39:03.796150 systemd[1]: Set up automount boot.automount. Jul 16 12:39:03.796182 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 16 12:39:03.796216 systemd[1]: Stopped target initrd-switch-root.target. Jul 16 12:39:03.796243 systemd[1]: Stopped target initrd-fs.target. Jul 16 12:39:03.796264 systemd[1]: Stopped target initrd-root-fs.target. Jul 16 12:39:03.796289 systemd[1]: Reached target integritysetup.target. Jul 16 12:39:03.796315 systemd[1]: Reached target remote-cryptsetup.target. Jul 16 12:39:03.796342 systemd[1]: Reached target remote-fs.target. Jul 16 12:39:03.796363 systemd[1]: Reached target slices.target. Jul 16 12:39:03.796396 systemd[1]: Reached target swap.target. Jul 16 12:39:03.796423 systemd[1]: Reached target torcx.target. Jul 16 12:39:03.796445 systemd[1]: Reached target veritysetup.target. Jul 16 12:39:03.796480 systemd[1]: Listening on systemd-coredump.socket. Jul 16 12:39:03.796508 systemd[1]: Listening on systemd-initctl.socket. Jul 16 12:39:03.796530 systemd[1]: Listening on systemd-networkd.socket. Jul 16 12:39:03.796556 systemd[1]: Listening on systemd-udevd-control.socket. Jul 16 12:39:03.796583 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 16 12:39:03.796610 systemd[1]: Listening on systemd-userdbd.socket. Jul 16 12:39:03.796643 systemd[1]: Mounting dev-hugepages.mount... Jul 16 12:39:03.796671 systemd[1]: Mounting dev-mqueue.mount... Jul 16 12:39:03.796692 systemd[1]: Mounting media.mount... Jul 16 12:39:03.796712 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:03.796738 systemd[1]: Mounting sys-kernel-debug.mount... Jul 16 12:39:03.796760 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 16 12:39:03.796785 systemd[1]: Mounting tmp.mount... Jul 16 12:39:03.796807 systemd[1]: Starting flatcar-tmpfiles.service... Jul 16 12:39:03.796832 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:39:03.796886 systemd[1]: Starting kmod-static-nodes.service... Jul 16 12:39:03.796911 systemd[1]: Starting modprobe@configfs.service... Jul 16 12:39:03.796932 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:39:03.796952 systemd[1]: Starting modprobe@drm.service... Jul 16 12:39:03.796980 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:39:03.797001 systemd[1]: Starting modprobe@fuse.service... Jul 16 12:39:03.797022 systemd[1]: Starting modprobe@loop.service... Jul 16 12:39:03.797054 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 16 12:39:03.797076 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 16 12:39:03.797114 systemd[1]: Stopped systemd-fsck-root.service. Jul 16 12:39:03.797136 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 16 12:39:03.797156 systemd[1]: Stopped systemd-fsck-usr.service. Jul 16 12:39:03.797177 systemd[1]: Stopped systemd-journald.service. Jul 16 12:39:03.797204 systemd[1]: Starting systemd-journald.service... Jul 16 12:39:03.797230 systemd[1]: Starting systemd-modules-load.service... Jul 16 12:39:03.797262 systemd[1]: Starting systemd-network-generator.service... Jul 16 12:39:03.797296 systemd[1]: Starting systemd-remount-fs.service... Jul 16 12:39:03.797318 systemd[1]: Starting systemd-udev-trigger.service... Jul 16 12:39:03.797352 kernel: fuse: init (API version 7.34) Jul 16 12:39:03.797374 systemd[1]: verity-setup.service: Deactivated successfully. Jul 16 12:39:03.797400 systemd[1]: Stopped verity-setup.service. Jul 16 12:39:03.797422 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:03.797443 systemd[1]: Mounted dev-hugepages.mount. Jul 16 12:39:03.797469 systemd[1]: Mounted dev-mqueue.mount. Jul 16 12:39:03.797502 systemd[1]: Mounted media.mount. Jul 16 12:39:03.797530 systemd[1]: Mounted sys-kernel-debug.mount. Jul 16 12:39:03.797551 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 16 12:39:03.797587 systemd[1]: Mounted tmp.mount. Jul 16 12:39:03.797622 systemd[1]: Finished kmod-static-nodes.service. Jul 16 12:39:03.797650 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 16 12:39:03.797671 systemd[1]: Finished modprobe@configfs.service. Jul 16 12:39:03.797697 kernel: loop: module loaded Jul 16 12:39:03.797733 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:39:03.797756 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:39:03.797777 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 16 12:39:03.797804 systemd[1]: Finished modprobe@drm.service. Jul 16 12:39:03.797833 systemd-journald[982]: Journal started Jul 16 12:39:03.799989 systemd-journald[982]: Runtime Journal (/run/log/journal/de230163e1cd442ba60f0ce37df1c8bf) is 4.7M, max 38.1M, 33.3M free. Jul 16 12:39:03.800057 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:38:59.693000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 16 12:38:59.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 16 12:38:59.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 16 12:38:59.840000 audit: BPF prog-id=10 op=LOAD Jul 16 12:38:59.840000 audit: BPF prog-id=10 op=UNLOAD Jul 16 12:38:59.840000 audit: BPF prog-id=11 op=LOAD Jul 16 12:38:59.840000 audit: BPF prog-id=11 op=UNLOAD Jul 16 12:38:59.980000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 16 12:38:59.980000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a4 a1=c0000cede0 a2=c0000d7040 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:38:59.980000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 16 12:38:59.983000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 16 12:38:59.983000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:38:59.983000 audit: CWD cwd="/" Jul 16 12:38:59.983000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:38:59.983000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:38:59.983000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 16 12:39:03.504000 audit: BPF prog-id=12 op=LOAD Jul 16 12:39:03.504000 audit: BPF prog-id=3 op=UNLOAD Jul 16 12:39:03.504000 audit: BPF prog-id=13 op=LOAD Jul 16 12:39:03.504000 audit: BPF prog-id=14 op=LOAD Jul 16 12:39:03.504000 audit: BPF prog-id=4 op=UNLOAD Jul 16 12:39:03.504000 audit: BPF prog-id=5 op=UNLOAD Jul 16 12:39:03.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.517000 audit: BPF prog-id=12 op=UNLOAD Jul 16 12:39:03.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.801758 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:39:03.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.806564 systemd[1]: Started systemd-journald.service. Jul 16 12:39:03.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.696000 audit: BPF prog-id=15 op=LOAD Jul 16 12:39:03.698000 audit: BPF prog-id=16 op=LOAD Jul 16 12:39:03.698000 audit: BPF prog-id=17 op=LOAD Jul 16 12:39:03.698000 audit: BPF prog-id=13 op=UNLOAD Jul 16 12:39:03.698000 audit: BPF prog-id=14 op=UNLOAD Jul 16 12:39:03.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.791000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 16 12:39:03.791000 audit[982]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe31e2e650 a2=4000 a3=7ffe31e2e6ec items=0 ppid=1 pid=982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:03.791000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 16 12:39:03.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.976545 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:39:03.499356 systemd[1]: Queued start job for default target multi-user.target. Jul 16 12:38:59.977288 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 16 12:39:03.499389 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 16 12:38:59.977342 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 16 12:39:03.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.508039 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 16 12:38:59.977421 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 16 12:39:03.806372 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 16 12:38:59.977441 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 16 12:39:03.809060 systemd[1]: Finished modprobe@fuse.service. Jul 16 12:38:59.977505 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 16 12:39:03.810316 systemd[1]: Finished flatcar-tmpfiles.service. Jul 16 12:38:59.977537 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 16 12:39:03.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.977953 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 16 12:38:59.978080 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 16 12:38:59.978112 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 16 12:38:59.980154 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 16 12:39:03.811483 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:38:59.980215 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 16 12:39:03.811682 systemd[1]: Finished modprobe@loop.service. Jul 16 12:38:59.980248 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 Jul 16 12:39:03.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:38:59.980277 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 16 12:38:59.980309 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 Jul 16 12:38:59.980336 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:38:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 16 12:39:02.904271 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:39:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:39:02.905209 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:39:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:39:03.813050 systemd[1]: Finished systemd-modules-load.service. Jul 16 12:39:02.905486 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:39:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:39:02.905963 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:39:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:39:02.906099 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:39:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 16 12:39:02.906257 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-07-16T12:39:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 16 12:39:03.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.814652 systemd[1]: Finished systemd-network-generator.service. Jul 16 12:39:03.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.816636 systemd[1]: Finished systemd-remount-fs.service. Jul 16 12:39:03.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.818306 systemd[1]: Reached target network-pre.target. Jul 16 12:39:03.820955 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 16 12:39:03.826532 systemd[1]: Mounting sys-kernel-config.mount... Jul 16 12:39:03.829914 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 16 12:39:03.832347 systemd[1]: Starting systemd-hwdb-update.service... Jul 16 12:39:03.838357 systemd[1]: Starting systemd-journal-flush.service... Jul 16 12:39:03.839208 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:39:03.841160 systemd[1]: Starting systemd-random-seed.service... Jul 16 12:39:03.844021 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:39:03.845823 systemd[1]: Starting systemd-sysctl.service... Jul 16 12:39:03.848358 systemd[1]: Starting systemd-sysusers.service... Jul 16 12:39:03.858202 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 16 12:39:03.859110 systemd[1]: Mounted sys-kernel-config.mount. Jul 16 12:39:03.872889 systemd-journald[982]: Time spent on flushing to /var/log/journal/de230163e1cd442ba60f0ce37df1c8bf is 55.634ms for 1283 entries. Jul 16 12:39:03.872889 systemd-journald[982]: System Journal (/var/log/journal/de230163e1cd442ba60f0ce37df1c8bf) is 8.0M, max 584.8M, 576.8M free. Jul 16 12:39:03.954281 systemd-journald[982]: Received client request to flush runtime journal. Jul 16 12:39:03.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.887314 systemd[1]: Finished systemd-random-seed.service. Jul 16 12:39:03.888214 systemd[1]: Reached target first-boot-complete.target. Jul 16 12:39:03.899313 systemd[1]: Finished systemd-sysusers.service. Jul 16 12:39:03.901952 systemd[1]: Finished systemd-sysctl.service. Jul 16 12:39:03.955808 systemd[1]: Finished systemd-journal-flush.service. Jul 16 12:39:03.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.967559 systemd[1]: Finished systemd-udev-trigger.service. Jul 16 12:39:03.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:03.970134 systemd[1]: Starting systemd-udev-settle.service... Jul 16 12:39:03.981367 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 16 12:39:04.494305 systemd[1]: Finished systemd-hwdb-update.service. Jul 16 12:39:04.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:04.505883 kernel: kauditd_printk_skb: 94 callbacks suppressed Jul 16 12:39:04.506021 kernel: audit: type=1130 audit(1752669544.496:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:04.506085 kernel: audit: type=1334 audit(1752669544.503:135): prog-id=18 op=LOAD Jul 16 12:39:04.506137 kernel: audit: type=1334 audit(1752669544.505:136): prog-id=19 op=LOAD Jul 16 12:39:04.503000 audit: BPF prog-id=18 op=LOAD Jul 16 12:39:04.505000 audit: BPF prog-id=19 op=LOAD Jul 16 12:39:04.507317 kernel: audit: type=1334 audit(1752669544.505:137): prog-id=7 op=UNLOAD Jul 16 12:39:04.505000 audit: BPF prog-id=7 op=UNLOAD Jul 16 12:39:04.516928 kernel: audit: type=1334 audit(1752669544.505:138): prog-id=8 op=UNLOAD Jul 16 12:39:04.505000 audit: BPF prog-id=8 op=UNLOAD Jul 16 12:39:04.507835 systemd[1]: Starting systemd-udevd.service... Jul 16 12:39:04.535550 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Jul 16 12:39:04.628516 systemd[1]: Started systemd-udevd.service. Jul 16 12:39:04.633806 systemd[1]: Starting systemd-networkd.service... Jul 16 12:39:04.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:04.641882 kernel: audit: type=1130 audit(1752669544.628:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:04.651930 kernel: audit: type=1334 audit(1752669544.631:140): prog-id=20 op=LOAD Jul 16 12:39:04.652036 kernel: audit: type=1334 audit(1752669544.642:141): prog-id=21 op=LOAD Jul 16 12:39:04.631000 audit: BPF prog-id=20 op=LOAD Jul 16 12:39:04.642000 audit: BPF prog-id=21 op=LOAD Jul 16 12:39:04.645063 systemd[1]: Starting systemd-userdbd.service... Jul 16 12:39:04.643000 audit: BPF prog-id=22 op=LOAD Jul 16 12:39:04.656901 kernel: audit: type=1334 audit(1752669544.643:142): prog-id=22 op=LOAD Jul 16 12:39:04.643000 audit: BPF prog-id=23 op=LOAD Jul 16 12:39:04.659911 kernel: audit: type=1334 audit(1752669544.643:143): prog-id=23 op=LOAD Jul 16 12:39:04.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:04.709211 systemd[1]: Started systemd-userdbd.service. Jul 16 12:39:04.748659 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 16 12:39:04.810897 kernel: mousedev: PS/2 mouse device common for all mice Jul 16 12:39:04.826004 systemd-networkd[1024]: lo: Link UP Jul 16 12:39:04.826020 systemd-networkd[1024]: lo: Gained carrier Jul 16 12:39:04.826953 systemd-networkd[1024]: Enumeration completed Jul 16 12:39:04.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:04.827104 systemd[1]: Started systemd-networkd.service. Jul 16 12:39:04.836894 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Jul 16 12:39:04.843894 kernel: ACPI: button: Power Button [PWRF] Jul 16 12:39:04.893575 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 16 12:39:04.895679 systemd-networkd[1024]: eth0: Link UP Jul 16 12:39:04.895693 systemd-networkd[1024]: eth0: Gained carrier Jul 16 12:39:04.882000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 16 12:39:04.882000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5580e3090090 a1=338ac a2=7fb23d78bbc5 a3=5 items=110 ppid=1013 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:04.882000 audit: CWD cwd="/" Jul 16 12:39:04.882000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=1 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=2 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=3 name=(null) inode=15619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=4 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=5 name=(null) inode=15620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=6 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=7 name=(null) inode=15621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=8 name=(null) inode=15621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=9 name=(null) inode=15622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=10 name=(null) inode=15621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=11 name=(null) inode=15623 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=12 name=(null) inode=15621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=13 name=(null) inode=15624 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=14 name=(null) inode=15621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=15 name=(null) inode=15625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=16 name=(null) inode=15621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=17 name=(null) inode=15626 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=18 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=19 name=(null) inode=15627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=20 name=(null) inode=15627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=21 name=(null) inode=15628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=22 name=(null) inode=15627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=23 name=(null) inode=15629 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=24 name=(null) inode=15627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=25 name=(null) inode=15630 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=26 name=(null) inode=15627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=27 name=(null) inode=15631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=28 name=(null) inode=15627 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=29 name=(null) inode=15632 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=30 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=31 name=(null) inode=15633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=32 name=(null) inode=15633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=33 name=(null) inode=15634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=34 name=(null) inode=15633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=35 name=(null) inode=15635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=36 name=(null) inode=15633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=37 name=(null) inode=15636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=38 name=(null) inode=15633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=39 name=(null) inode=15637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=40 name=(null) inode=15633 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=41 name=(null) inode=15638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=42 name=(null) inode=15618 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=43 name=(null) inode=15639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=44 name=(null) inode=15639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=45 name=(null) inode=15640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=46 name=(null) inode=15639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=47 name=(null) inode=15641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=48 name=(null) inode=15639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=49 name=(null) inode=15642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=50 name=(null) inode=15639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=51 name=(null) inode=15643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=52 name=(null) inode=15639 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=53 name=(null) inode=15644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=55 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=56 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=57 name=(null) inode=15646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=58 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=59 name=(null) inode=15647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=60 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=61 name=(null) inode=15648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=62 name=(null) inode=15648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=63 name=(null) inode=15649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=64 name=(null) inode=15648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=65 name=(null) inode=15650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=66 name=(null) inode=15648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=67 name=(null) inode=15651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=68 name=(null) inode=15648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=69 name=(null) inode=15652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=70 name=(null) inode=15648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=71 name=(null) inode=15653 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=72 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=73 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=74 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=75 name=(null) inode=15655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=76 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=77 name=(null) inode=15656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=78 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=79 name=(null) inode=15657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=80 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=81 name=(null) inode=15658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=82 name=(null) inode=15654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=83 name=(null) inode=15659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=84 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=85 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=86 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=87 name=(null) inode=15661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=88 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=89 name=(null) inode=15662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=90 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=91 name=(null) inode=15663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=92 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=93 name=(null) inode=15664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=94 name=(null) inode=15660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=95 name=(null) inode=15665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.911913 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 16 12:39:04.927257 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 16 12:39:04.927555 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 16 12:39:04.882000 audit: PATH item=96 name=(null) inode=15645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=97 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=98 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=99 name=(null) inode=15667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=100 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=101 name=(null) inode=15668 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=102 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=103 name=(null) inode=15669 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=104 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=105 name=(null) inode=15670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=106 name=(null) inode=15666 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=107 name=(null) inode=15671 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PATH item=109 name=(null) inode=15672 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:39:04.882000 audit: PROCTITLE proctitle="(udev-worker)" Jul 16 12:39:04.916062 systemd-networkd[1024]: eth0: DHCPv4 address 10.230.12.146/30, gateway 10.230.12.145 acquired from 10.230.12.145 Jul 16 12:39:04.971971 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Jul 16 12:39:04.979775 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 16 12:39:05.126628 systemd[1]: Finished systemd-udev-settle.service. Jul 16 12:39:05.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.129394 systemd[1]: Starting lvm2-activation-early.service... Jul 16 12:39:05.154399 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 16 12:39:05.183845 systemd[1]: Finished lvm2-activation-early.service. Jul 16 12:39:05.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.185673 systemd[1]: Reached target cryptsetup.target. Jul 16 12:39:05.188536 systemd[1]: Starting lvm2-activation.service... Jul 16 12:39:05.194441 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 16 12:39:05.227312 systemd[1]: Finished lvm2-activation.service. Jul 16 12:39:05.228226 systemd[1]: Reached target local-fs-pre.target. Jul 16 12:39:05.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.228934 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 16 12:39:05.228982 systemd[1]: Reached target local-fs.target. Jul 16 12:39:05.229587 systemd[1]: Reached target machines.target. Jul 16 12:39:05.232229 systemd[1]: Starting ldconfig.service... Jul 16 12:39:05.233641 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:39:05.233703 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:05.235593 systemd[1]: Starting systemd-boot-update.service... Jul 16 12:39:05.238882 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 16 12:39:05.245336 systemd[1]: Starting systemd-machine-id-commit.service... Jul 16 12:39:05.248588 systemd[1]: Starting systemd-sysext.service... Jul 16 12:39:05.260937 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Jul 16 12:39:05.263432 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 16 12:39:05.267799 systemd[1]: Unmounting usr-share-oem.mount... Jul 16 12:39:05.274326 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 16 12:39:05.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.319421 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 16 12:39:05.319702 systemd[1]: Unmounted usr-share-oem.mount. Jul 16 12:39:05.339913 kernel: loop0: detected capacity change from 0 to 221472 Jul 16 12:39:05.405463 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 16 12:39:05.407583 systemd[1]: Finished systemd-machine-id-commit.service. Jul 16 12:39:05.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.430170 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 16 12:39:05.453903 kernel: loop1: detected capacity change from 0 to 221472 Jul 16 12:39:05.474945 (sd-sysext)[1057]: Using extensions 'kubernetes'. Jul 16 12:39:05.477437 (sd-sysext)[1057]: Merged extensions into '/usr'. Jul 16 12:39:05.502589 systemd-fsck[1054]: fsck.fat 4.2 (2021-01-31) Jul 16 12:39:05.502589 systemd-fsck[1054]: /dev/vda1: 790 files, 120725/258078 clusters Jul 16 12:39:05.510735 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 16 12:39:05.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.514366 systemd[1]: Mounting boot.mount... Jul 16 12:39:05.515077 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:05.522013 systemd[1]: Mounting usr-share-oem.mount... Jul 16 12:39:05.523030 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:39:05.527820 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:39:05.532269 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:39:05.534566 systemd[1]: Starting modprobe@loop.service... Jul 16 12:39:05.535341 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:39:05.535500 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:05.535670 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:05.541437 systemd[1]: Mounted boot.mount. Jul 16 12:39:05.542570 systemd[1]: Mounted usr-share-oem.mount. Jul 16 12:39:05.543961 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:39:05.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.544188 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:39:05.545453 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:39:05.545666 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:39:05.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.546918 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:39:05.547100 systemd[1]: Finished modprobe@loop.service. Jul 16 12:39:05.551520 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:39:05.551687 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:39:05.554917 systemd[1]: Finished systemd-sysext.service. Jul 16 12:39:05.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.558989 systemd[1]: Starting ensure-sysext.service... Jul 16 12:39:05.561789 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 16 12:39:05.576292 systemd[1]: Reloading. Jul 16 12:39:05.607099 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 16 12:39:05.617146 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 16 12:39:05.632525 systemd-tmpfiles[1065]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 16 12:39:05.706759 /usr/lib/systemd/system-generators/torcx-generator[1084]: time="2025-07-16T12:39:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:39:05.711467 /usr/lib/systemd/system-generators/torcx-generator[1084]: time="2025-07-16T12:39:05Z" level=info msg="torcx already run" Jul 16 12:39:05.811901 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 16 12:39:05.859030 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:39:05.859066 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:39:05.887326 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:39:05.972000 audit: BPF prog-id=24 op=LOAD Jul 16 12:39:05.972000 audit: BPF prog-id=20 op=UNLOAD Jul 16 12:39:05.973000 audit: BPF prog-id=25 op=LOAD Jul 16 12:39:05.973000 audit: BPF prog-id=21 op=UNLOAD Jul 16 12:39:05.973000 audit: BPF prog-id=26 op=LOAD Jul 16 12:39:05.973000 audit: BPF prog-id=27 op=LOAD Jul 16 12:39:05.973000 audit: BPF prog-id=22 op=UNLOAD Jul 16 12:39:05.973000 audit: BPF prog-id=23 op=UNLOAD Jul 16 12:39:05.975000 audit: BPF prog-id=28 op=LOAD Jul 16 12:39:05.975000 audit: BPF prog-id=15 op=UNLOAD Jul 16 12:39:05.975000 audit: BPF prog-id=29 op=LOAD Jul 16 12:39:05.975000 audit: BPF prog-id=30 op=LOAD Jul 16 12:39:05.975000 audit: BPF prog-id=16 op=UNLOAD Jul 16 12:39:05.975000 audit: BPF prog-id=17 op=UNLOAD Jul 16 12:39:05.979000 audit: BPF prog-id=31 op=LOAD Jul 16 12:39:05.979000 audit: BPF prog-id=32 op=LOAD Jul 16 12:39:05.979000 audit: BPF prog-id=18 op=UNLOAD Jul 16 12:39:05.979000 audit: BPF prog-id=19 op=UNLOAD Jul 16 12:39:05.984585 systemd[1]: Finished ldconfig.service. Jul 16 12:39:05.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.987524 systemd[1]: Finished systemd-boot-update.service. Jul 16 12:39:05.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.989923 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 16 12:39:05.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:05.996246 systemd[1]: Starting audit-rules.service... Jul 16 12:39:05.998509 systemd[1]: Starting clean-ca-certificates.service... Jul 16 12:39:06.002709 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 16 12:39:06.007000 audit: BPF prog-id=33 op=LOAD Jul 16 12:39:06.010106 systemd[1]: Starting systemd-resolved.service... Jul 16 12:39:06.011000 audit: BPF prog-id=34 op=LOAD Jul 16 12:39:06.013957 systemd[1]: Starting systemd-timesyncd.service... Jul 16 12:39:06.017947 systemd[1]: Starting systemd-update-utmp.service... Jul 16 12:39:06.029686 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:06.030064 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.032171 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:39:06.036761 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:39:06.039623 systemd[1]: Starting modprobe@loop.service... Jul 16 12:39:06.042059 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.042286 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:06.042542 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:06.046504 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:39:06.046751 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:39:06.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.049728 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:06.050239 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.053874 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:39:06.054645 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.054940 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:06.055215 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:06.056850 systemd[1]: Finished clean-ca-certificates.service. Jul 16 12:39:06.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.061023 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:39:06.061257 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:39:06.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.066220 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:06.066589 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.069434 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:39:06.073034 systemd[1]: Starting modprobe@drm.service... Jul 16 12:39:06.074381 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.074626 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:06.077469 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 16 12:39:06.079037 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 16 12:39:06.079237 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:39:06.081000 audit[1140]: SYSTEM_BOOT pid=1140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.082980 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:39:06.083243 systemd[1]: Finished modprobe@loop.service. Jul 16 12:39:06.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.088260 systemd[1]: Finished ensure-sysext.service. Jul 16 12:39:06.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.093113 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:39:06.093330 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:39:06.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.094676 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:39:06.096987 systemd[1]: Finished systemd-update-utmp.service. Jul 16 12:39:06.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.099729 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:39:06.099992 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:39:06.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.100795 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.105003 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 16 12:39:06.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.107663 systemd[1]: Starting systemd-update-done.service... Jul 16 12:39:06.114780 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 16 12:39:06.115057 systemd[1]: Finished modprobe@drm.service. Jul 16 12:39:06.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.122323 systemd[1]: Finished systemd-update-done.service. Jul 16 12:39:06.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:06.184360 augenrules[1160]: No rules Jul 16 12:39:06.183000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 16 12:39:06.183000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0cb15480 a2=420 a3=0 items=0 ppid=1132 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:06.183000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 16 12:39:06.185730 systemd[1]: Finished audit-rules.service. Jul 16 12:39:06.188246 systemd[1]: Started systemd-timesyncd.service. Jul 16 12:39:06.189040 systemd[1]: Reached target time-set.target. Jul 16 12:39:06.189357 systemd-resolved[1136]: Positive Trust Anchors: Jul 16 12:39:06.189380 systemd-resolved[1136]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 16 12:39:06.189418 systemd-resolved[1136]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 16 12:39:06.197662 systemd-resolved[1136]: Using system hostname 'srv-uobsc.gb1.brightbox.com'. Jul 16 12:39:06.200489 systemd[1]: Started systemd-resolved.service. Jul 16 12:39:06.201287 systemd[1]: Reached target network.target. Jul 16 12:39:06.201904 systemd[1]: Reached target nss-lookup.target. Jul 16 12:39:06.202510 systemd[1]: Reached target sysinit.target. Jul 16 12:39:06.203246 systemd[1]: Started motdgen.path. Jul 16 12:39:06.203870 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 16 12:39:06.204817 systemd[1]: Started logrotate.timer. Jul 16 12:39:06.205609 systemd[1]: Started mdadm.timer. Jul 16 12:39:06.206234 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 16 12:39:06.206871 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 16 12:39:06.206913 systemd[1]: Reached target paths.target. Jul 16 12:39:06.207493 systemd[1]: Reached target timers.target. Jul 16 12:39:06.208622 systemd[1]: Listening on dbus.socket. Jul 16 12:39:06.211265 systemd[1]: Starting docker.socket... Jul 16 12:39:06.215913 systemd[1]: Listening on sshd.socket. Jul 16 12:39:06.216649 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:06.217313 systemd[1]: Listening on docker.socket. Jul 16 12:39:06.218102 systemd[1]: Reached target sockets.target. Jul 16 12:39:06.218706 systemd[1]: Reached target basic.target. Jul 16 12:39:06.232530 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.232587 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 16 12:39:06.234215 systemd[1]: Starting containerd.service... Jul 16 12:39:06.236414 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 16 12:39:06.238846 systemd[1]: Starting dbus.service... Jul 16 12:39:06.241286 systemd[1]: Starting enable-oem-cloudinit.service... Jul 16 12:39:06.245112 systemd[1]: Starting extend-filesystems.service... Jul 16 12:39:06.250366 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 16 12:39:06.252337 systemd[1]: Starting motdgen.service... Jul 16 12:39:06.255085 systemd[1]: Starting prepare-helm.service... Jul 16 12:39:06.258406 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 16 12:39:06.270035 jq[1171]: false Jul 16 12:39:06.262721 systemd[1]: Starting sshd-keygen.service... Jul 16 12:39:06.271489 systemd[1]: Starting systemd-logind.service... Jul 16 12:39:06.272317 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:39:06.272521 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 16 12:39:06.273909 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 16 12:39:06.277104 systemd[1]: Starting update-engine.service... Jul 16 12:39:06.279396 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 16 12:39:06.284559 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 16 12:39:06.284897 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 16 12:39:06.307194 jq[1183]: true Jul 16 12:39:06.318234 tar[1186]: linux-amd64/helm Jul 16 12:39:06.322300 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 16 12:39:06.322590 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 16 12:39:06.338271 jq[1198]: true Jul 16 12:39:06.350756 extend-filesystems[1173]: Found loop1 Jul 16 12:39:06.353847 dbus-daemon[1170]: [system] SELinux support is enabled Jul 16 12:39:06.354125 systemd[1]: Started dbus.service. Jul 16 12:39:06.355776 extend-filesystems[1173]: Found vda Jul 16 12:39:06.356903 extend-filesystems[1173]: Found vda1 Jul 16 12:39:06.356903 extend-filesystems[1173]: Found vda2 Jul 16 12:39:06.356903 extend-filesystems[1173]: Found vda3 Jul 16 12:39:06.356903 extend-filesystems[1173]: Found usr Jul 16 12:39:06.365002 extend-filesystems[1173]: Found vda4 Jul 16 12:39:06.365002 extend-filesystems[1173]: Found vda6 Jul 16 12:39:06.365002 extend-filesystems[1173]: Found vda7 Jul 16 12:39:06.365002 extend-filesystems[1173]: Found vda9 Jul 16 12:39:06.365002 extend-filesystems[1173]: Checking size of /dev/vda9 Jul 16 12:39:06.361780 dbus-daemon[1170]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1024 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 16 12:39:06.358006 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 16 12:39:06.371899 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 16 12:39:06.358064 systemd[1]: Reached target system-config.target. Jul 16 12:39:06.359419 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 16 12:39:06.359450 systemd[1]: Reached target user-config.target. Jul 16 12:39:06.377485 systemd[1]: Starting systemd-hostnamed.service... Jul 16 12:39:06.976158 systemd-timesyncd[1139]: Contacted time server 51.89.139.80:123 (0.flatcar.pool.ntp.org). Jul 16 12:39:06.976207 systemd-resolved[1136]: Clock change detected. Flushing caches. Jul 16 12:39:06.976379 systemd-timesyncd[1139]: Initial clock synchronization to Wed 2025-07-16 12:39:06.975530 UTC. Jul 16 12:39:06.984146 systemd[1]: motdgen.service: Deactivated successfully. Jul 16 12:39:06.984397 systemd[1]: Finished motdgen.service. Jul 16 12:39:07.006324 systemd[1]: Created slice system-sshd.slice. Jul 16 12:39:07.021068 extend-filesystems[1173]: Resized partition /dev/vda9 Jul 16 12:39:07.038106 update_engine[1182]: I0716 12:39:07.036501 1182 main.cc:92] Flatcar Update Engine starting Jul 16 12:39:07.043706 systemd[1]: Started update-engine.service. Jul 16 12:39:07.044248 update_engine[1182]: I0716 12:39:07.044106 1182 update_check_scheduler.cc:74] Next update check in 10m23s Jul 16 12:39:07.047181 systemd[1]: Started locksmithd.service. Jul 16 12:39:07.047586 extend-filesystems[1221]: resize2fs 1.46.5 (30-Dec-2021) Jul 16 12:39:07.060911 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Jul 16 12:39:07.125416 systemd-logind[1180]: Watching system buttons on /dev/input/event2 (Power Button) Jul 16 12:39:07.126144 systemd-logind[1180]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 16 12:39:07.126757 systemd-logind[1180]: New seat seat0. Jul 16 12:39:07.127382 systemd-networkd[1024]: eth0: Gained IPv6LL Jul 16 12:39:07.131040 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 16 12:39:07.136749 bash[1226]: Updated "/home/core/.ssh/authorized_keys" Jul 16 12:39:07.136462 systemd[1]: Reached target network-online.target. Jul 16 12:39:07.139421 systemd[1]: Starting kubelet.service... Jul 16 12:39:07.144426 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 16 12:39:07.146631 systemd[1]: Started systemd-logind.service. Jul 16 12:39:07.163895 env[1190]: time="2025-07-16T12:39:07.163283880Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 16 12:39:07.252561 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Jul 16 12:39:07.256088 env[1190]: time="2025-07-16T12:39:07.256026503Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 16 12:39:07.262414 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 16 12:39:07.262591 systemd[1]: Started systemd-hostnamed.service. Jul 16 12:39:07.264308 dbus-daemon[1170]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1207 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 16 12:39:07.270358 systemd[1]: Starting polkit.service... Jul 16 12:39:07.284062 extend-filesystems[1221]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 16 12:39:07.284062 extend-filesystems[1221]: old_desc_blocks = 1, new_desc_blocks = 8 Jul 16 12:39:07.284062 extend-filesystems[1221]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.280076053Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.282747433Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.282785919Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.283096462Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.283123796Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.283143604Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.283160478Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.283365960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:39:07.289001 env[1190]: time="2025-07-16T12:39:07.283787354Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:39:07.280362 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 16 12:39:07.289525 extend-filesystems[1173]: Resized filesystem in /dev/vda9 Jul 16 12:39:07.280628 systemd[1]: Finished extend-filesystems.service. Jul 16 12:39:07.295226 env[1190]: time="2025-07-16T12:39:07.294119688Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 16 12:39:07.295226 env[1190]: time="2025-07-16T12:39:07.294167481Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 16 12:39:07.295226 env[1190]: time="2025-07-16T12:39:07.294262316Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 16 12:39:07.295226 env[1190]: time="2025-07-16T12:39:07.294286007Z" level=info msg="metadata content store policy set" policy=shared Jul 16 12:39:07.302954 env[1190]: time="2025-07-16T12:39:07.302913439Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 16 12:39:07.303039 env[1190]: time="2025-07-16T12:39:07.302963471Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 16 12:39:07.303039 env[1190]: time="2025-07-16T12:39:07.302989046Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 16 12:39:07.303126 env[1190]: time="2025-07-16T12:39:07.303051823Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303126 env[1190]: time="2025-07-16T12:39:07.303077663Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303126 env[1190]: time="2025-07-16T12:39:07.303098940Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303126 env[1190]: time="2025-07-16T12:39:07.303122648Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303317 env[1190]: time="2025-07-16T12:39:07.303144276Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303317 env[1190]: time="2025-07-16T12:39:07.303163767Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303317 env[1190]: time="2025-07-16T12:39:07.303184447Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303317 env[1190]: time="2025-07-16T12:39:07.303205307Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.303317 env[1190]: time="2025-07-16T12:39:07.303233126Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 16 12:39:07.303539 env[1190]: time="2025-07-16T12:39:07.303384543Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 16 12:39:07.303611 env[1190]: time="2025-07-16T12:39:07.303546800Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.303891661Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.303948005Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.303974073Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304060825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304086590Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304111390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304137626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304158650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304178922Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304200112Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304218503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304246 env[1190]: time="2025-07-16T12:39:07.304240892Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304437786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304464545Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304483822Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304501839Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304524005Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304541686Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304589325Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 16 12:39:07.304987 env[1190]: time="2025-07-16T12:39:07.304651715Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 16 12:39:07.306019 polkitd[1233]: Started polkitd version 121 Jul 16 12:39:07.311709 env[1190]: time="2025-07-16T12:39:07.311250042Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 16 12:39:07.311709 env[1190]: time="2025-07-16T12:39:07.311357036Z" level=info msg="Connect containerd service" Jul 16 12:39:07.311709 env[1190]: time="2025-07-16T12:39:07.311432042Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.312232915Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.314202354Z" level=info msg="Start subscribing containerd event" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.314293253Z" level=info msg="Start recovering state" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.314463534Z" level=info msg="Start event monitor" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.314538666Z" level=info msg="Start snapshots syncer" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.314573836Z" level=info msg="Start cni network conf syncer for default" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.314631323Z" level=info msg="Start streaming server" Jul 16 12:39:07.317066 env[1190]: time="2025-07-16T12:39:07.316729558Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 16 12:39:07.319998 env[1190]: time="2025-07-16T12:39:07.317626536Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 16 12:39:07.336614 polkitd[1233]: Loading rules from directory /etc/polkit-1/rules.d Jul 16 12:39:07.336710 polkitd[1233]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 16 12:39:07.339579 polkitd[1233]: Finished loading, compiling and executing 2 rules Jul 16 12:39:07.340283 dbus-daemon[1170]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 16 12:39:07.340549 systemd[1]: Started polkit.service. Jul 16 12:39:07.342576 polkitd[1233]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 16 12:39:07.345972 systemd[1]: Started containerd.service. Jul 16 12:39:07.354879 env[1190]: time="2025-07-16T12:39:07.354765620Z" level=info msg="containerd successfully booted in 0.203419s" Jul 16 12:39:07.363242 systemd-hostnamed[1207]: Hostname set to (static) Jul 16 12:39:08.016521 tar[1186]: linux-amd64/LICENSE Jul 16 12:39:08.017620 tar[1186]: linux-amd64/README.md Jul 16 12:39:08.027062 systemd[1]: Finished prepare-helm.service. Jul 16 12:39:08.093303 locksmithd[1225]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 16 12:39:08.095583 sshd_keygen[1200]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 16 12:39:08.130062 systemd[1]: Finished sshd-keygen.service. Jul 16 12:39:08.134431 systemd[1]: Starting issuegen.service... Jul 16 12:39:08.138404 systemd[1]: Started sshd@0-10.230.12.146:22-147.75.109.163:37360.service. Jul 16 12:39:08.153431 systemd[1]: issuegen.service: Deactivated successfully. Jul 16 12:39:08.153697 systemd[1]: Finished issuegen.service. Jul 16 12:39:08.156919 systemd[1]: Starting systemd-user-sessions.service... Jul 16 12:39:08.168113 systemd[1]: Finished systemd-user-sessions.service. Jul 16 12:39:08.172840 systemd[1]: Started getty@tty1.service. Jul 16 12:39:08.176439 systemd[1]: Started serial-getty@ttyS0.service. Jul 16 12:39:08.178547 systemd[1]: Reached target getty.target. Jul 16 12:39:08.637198 systemd-networkd[1024]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8324:24:19ff:fee6:c92/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8324:24:19ff:fee6:c92/64 assigned by NDisc. Jul 16 12:39:08.637211 systemd-networkd[1024]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Jul 16 12:39:08.733176 systemd[1]: Started kubelet.service. Jul 16 12:39:09.071143 sshd[1257]: Accepted publickey for core from 147.75.109.163 port 37360 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:09.072843 sshd[1257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:09.095977 systemd[1]: Created slice user-500.slice. Jul 16 12:39:09.101779 systemd[1]: Starting user-runtime-dir@500.service... Jul 16 12:39:09.110767 systemd-logind[1180]: New session 1 of user core. Jul 16 12:39:09.119397 systemd[1]: Finished user-runtime-dir@500.service. Jul 16 12:39:09.122686 systemd[1]: Starting user@500.service... Jul 16 12:39:09.129844 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:09.241579 systemd[1274]: Queued start job for default target default.target. Jul 16 12:39:09.242769 systemd[1274]: Reached target paths.target. Jul 16 12:39:09.242807 systemd[1274]: Reached target sockets.target. Jul 16 12:39:09.242829 systemd[1274]: Reached target timers.target. Jul 16 12:39:09.242849 systemd[1274]: Reached target basic.target. Jul 16 12:39:09.243115 systemd[1]: Started user@500.service. Jul 16 12:39:09.246548 systemd[1]: Started session-1.scope. Jul 16 12:39:09.248121 systemd[1274]: Reached target default.target. Jul 16 12:39:09.248351 systemd[1274]: Startup finished in 107ms. Jul 16 12:39:09.472642 kubelet[1267]: E0716 12:39:09.472483 1267 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:39:09.475321 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:39:09.475601 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:39:09.476055 systemd[1]: kubelet.service: Consumed 1.143s CPU time. Jul 16 12:39:09.905543 systemd[1]: Started sshd@1-10.230.12.146:22-147.75.109.163:57498.service. Jul 16 12:39:10.868899 sshd[1283]: Accepted publickey for core from 147.75.109.163 port 57498 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:10.871960 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:10.881116 systemd-logind[1180]: New session 2 of user core. Jul 16 12:39:10.882022 systemd[1]: Started session-2.scope. Jul 16 12:39:11.540234 sshd[1283]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:11.544274 systemd[1]: sshd@1-10.230.12.146:22-147.75.109.163:57498.service: Deactivated successfully. Jul 16 12:39:11.545362 systemd[1]: session-2.scope: Deactivated successfully. Jul 16 12:39:11.546221 systemd-logind[1180]: Session 2 logged out. Waiting for processes to exit. Jul 16 12:39:11.547299 systemd-logind[1180]: Removed session 2. Jul 16 12:39:11.674726 systemd[1]: Started sshd@2-10.230.12.146:22-147.75.109.163:57504.service. Jul 16 12:39:12.564841 sshd[1290]: Accepted publickey for core from 147.75.109.163 port 57504 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:12.565669 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:12.573162 systemd-logind[1180]: New session 3 of user core. Jul 16 12:39:12.573973 systemd[1]: Started session-3.scope. Jul 16 12:39:13.184382 sshd[1290]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:13.189246 systemd[1]: sshd@2-10.230.12.146:22-147.75.109.163:57504.service: Deactivated successfully. Jul 16 12:39:13.190311 systemd[1]: session-3.scope: Deactivated successfully. Jul 16 12:39:13.192717 systemd-logind[1180]: Session 3 logged out. Waiting for processes to exit. Jul 16 12:39:13.194367 systemd-logind[1180]: Removed session 3. Jul 16 12:39:14.011732 coreos-metadata[1169]: Jul 16 12:39:14.011 WARN failed to locate config-drive, using the metadata service API instead Jul 16 12:39:14.065806 coreos-metadata[1169]: Jul 16 12:39:14.065 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Jul 16 12:39:14.089186 coreos-metadata[1169]: Jul 16 12:39:14.089 INFO Fetch successful Jul 16 12:39:14.089552 coreos-metadata[1169]: Jul 16 12:39:14.089 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 16 12:39:14.127413 coreos-metadata[1169]: Jul 16 12:39:14.127 INFO Fetch successful Jul 16 12:39:14.129573 unknown[1169]: wrote ssh authorized keys file for user: core Jul 16 12:39:14.142901 update-ssh-keys[1297]: Updated "/home/core/.ssh/authorized_keys" Jul 16 12:39:14.144039 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 16 12:39:14.144520 systemd[1]: Reached target multi-user.target. Jul 16 12:39:14.146803 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 16 12:39:14.157225 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 16 12:39:14.157465 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 16 12:39:14.158061 systemd[1]: Startup finished in 1.286s (kernel) + 7.833s (initrd) + 13.947s (userspace) = 23.067s. Jul 16 12:39:19.607398 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 16 12:39:19.607714 systemd[1]: Stopped kubelet.service. Jul 16 12:39:19.607800 systemd[1]: kubelet.service: Consumed 1.143s CPU time. Jul 16 12:39:19.610138 systemd[1]: Starting kubelet.service... Jul 16 12:39:19.789377 systemd[1]: Started kubelet.service. Jul 16 12:39:19.871500 kubelet[1303]: E0716 12:39:19.870845 1303 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:39:19.875605 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:39:19.875838 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:39:23.331992 systemd[1]: Started sshd@3-10.230.12.146:22-147.75.109.163:48638.service. Jul 16 12:39:24.218508 sshd[1311]: Accepted publickey for core from 147.75.109.163 port 48638 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:24.221664 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:24.229736 systemd-logind[1180]: New session 4 of user core. Jul 16 12:39:24.229875 systemd[1]: Started session-4.scope. Jul 16 12:39:24.841560 sshd[1311]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:24.845695 systemd[1]: sshd@3-10.230.12.146:22-147.75.109.163:48638.service: Deactivated successfully. Jul 16 12:39:24.846899 systemd[1]: session-4.scope: Deactivated successfully. Jul 16 12:39:24.847838 systemd-logind[1180]: Session 4 logged out. Waiting for processes to exit. Jul 16 12:39:24.849699 systemd-logind[1180]: Removed session 4. Jul 16 12:39:24.987537 systemd[1]: Started sshd@4-10.230.12.146:22-147.75.109.163:48644.service. Jul 16 12:39:25.868664 sshd[1317]: Accepted publickey for core from 147.75.109.163 port 48644 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:25.870893 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:25.878780 systemd-logind[1180]: New session 5 of user core. Jul 16 12:39:25.879234 systemd[1]: Started session-5.scope. Jul 16 12:39:26.477977 sshd[1317]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:26.482480 systemd[1]: sshd@4-10.230.12.146:22-147.75.109.163:48644.service: Deactivated successfully. Jul 16 12:39:26.483722 systemd[1]: session-5.scope: Deactivated successfully. Jul 16 12:39:26.484505 systemd-logind[1180]: Session 5 logged out. Waiting for processes to exit. Jul 16 12:39:26.485749 systemd-logind[1180]: Removed session 5. Jul 16 12:39:26.631560 systemd[1]: Started sshd@5-10.230.12.146:22-147.75.109.163:48658.service. Jul 16 12:39:27.523799 sshd[1323]: Accepted publickey for core from 147.75.109.163 port 48658 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:27.526758 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:27.534459 systemd-logind[1180]: New session 6 of user core. Jul 16 12:39:27.535825 systemd[1]: Started session-6.scope. Jul 16 12:39:28.146794 sshd[1323]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:28.151618 systemd[1]: sshd@5-10.230.12.146:22-147.75.109.163:48658.service: Deactivated successfully. Jul 16 12:39:28.152775 systemd[1]: session-6.scope: Deactivated successfully. Jul 16 12:39:28.153644 systemd-logind[1180]: Session 6 logged out. Waiting for processes to exit. Jul 16 12:39:28.154951 systemd-logind[1180]: Removed session 6. Jul 16 12:39:28.295497 systemd[1]: Started sshd@6-10.230.12.146:22-147.75.109.163:48520.service. Jul 16 12:39:29.186261 sshd[1329]: Accepted publickey for core from 147.75.109.163 port 48520 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:29.188308 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:29.195568 systemd-logind[1180]: New session 7 of user core. Jul 16 12:39:29.196425 systemd[1]: Started session-7.scope. Jul 16 12:39:29.696255 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 16 12:39:29.696651 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:39:29.708911 dbus-daemon[1170]: \xd0\xed\x8d3PV: received setenforce notice (enforcing=1486352368) Jul 16 12:39:29.709145 sudo[1332]: pam_unix(sudo:session): session closed for user root Jul 16 12:39:29.855301 sshd[1329]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:29.859585 systemd[1]: sshd@6-10.230.12.146:22-147.75.109.163:48520.service: Deactivated successfully. Jul 16 12:39:29.860764 systemd[1]: session-7.scope: Deactivated successfully. Jul 16 12:39:29.861614 systemd-logind[1180]: Session 7 logged out. Waiting for processes to exit. Jul 16 12:39:29.862782 systemd-logind[1180]: Removed session 7. Jul 16 12:39:30.001463 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 16 12:39:30.001705 systemd[1]: Stopped kubelet.service. Jul 16 12:39:30.004122 systemd[1]: Starting kubelet.service... Jul 16 12:39:30.006310 systemd[1]: Started sshd@7-10.230.12.146:22-147.75.109.163:48530.service. Jul 16 12:39:30.180757 systemd[1]: Started kubelet.service. Jul 16 12:39:30.281682 kubelet[1342]: E0716 12:39:30.280859 1342 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:39:30.283812 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:39:30.284101 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:39:30.895996 sshd[1337]: Accepted publickey for core from 147.75.109.163 port 48530 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:30.898144 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:30.905523 systemd-logind[1180]: New session 8 of user core. Jul 16 12:39:30.906400 systemd[1]: Started session-8.scope. Jul 16 12:39:31.374350 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 16 12:39:31.375347 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:39:31.380512 sudo[1350]: pam_unix(sudo:session): session closed for user root Jul 16 12:39:31.387448 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 16 12:39:31.387811 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:39:31.401105 systemd[1]: Stopping audit-rules.service... Jul 16 12:39:31.401000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 16 12:39:31.406067 kernel: kauditd_printk_skb: 173 callbacks suppressed Jul 16 12:39:31.406205 kernel: audit: type=1305 audit(1752669571.401:202): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 16 12:39:31.406268 auditctl[1353]: No rules Jul 16 12:39:31.407027 systemd[1]: audit-rules.service: Deactivated successfully. Jul 16 12:39:31.407318 systemd[1]: Stopped audit-rules.service. Jul 16 12:39:31.401000 audit[1353]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6b91da10 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:31.416293 kernel: audit: type=1300 audit(1752669571.401:202): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6b91da10 a2=420 a3=0 items=0 ppid=1 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:31.417584 systemd[1]: Starting audit-rules.service... Jul 16 12:39:31.401000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 16 12:39:31.420886 kernel: audit: type=1327 audit(1752669571.401:202): proctitle=2F7362696E2F617564697463746C002D44 Jul 16 12:39:31.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.426903 kernel: audit: type=1131 audit(1752669571.405:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.444978 augenrules[1370]: No rules Jul 16 12:39:31.446251 systemd[1]: Finished audit-rules.service. Jul 16 12:39:31.447615 sudo[1349]: pam_unix(sudo:session): session closed for user root Jul 16 12:39:31.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.446000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.460389 kernel: audit: type=1130 audit(1752669571.445:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.460491 kernel: audit: type=1106 audit(1752669571.446:205): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.460555 kernel: audit: type=1104 audit(1752669571.446:206): pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.446000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.592168 sshd[1337]: pam_unix(sshd:session): session closed for user core Jul 16 12:39:31.593000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:31.602501 systemd[1]: sshd@7-10.230.12.146:22-147.75.109.163:48530.service: Deactivated successfully. Jul 16 12:39:31.604084 kernel: audit: type=1106 audit(1752669571.593:207): pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:31.604184 kernel: audit: type=1104 audit(1752669571.593:208): pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:31.593000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:31.603506 systemd[1]: session-8.scope: Deactivated successfully. Jul 16 12:39:31.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.12.146:22-147.75.109.163:48530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.615328 systemd-logind[1180]: Session 8 logged out. Waiting for processes to exit. Jul 16 12:39:31.615919 kernel: audit: type=1131 audit(1752669571.601:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.12.146:22-147.75.109.163:48530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:31.616623 systemd-logind[1180]: Removed session 8. Jul 16 12:39:31.738718 systemd[1]: Started sshd@8-10.230.12.146:22-147.75.109.163:48532.service. Jul 16 12:39:31.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.12.146:22-147.75.109.163:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:32.622000 audit[1376]: USER_ACCT pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:32.624048 sshd[1376]: Accepted publickey for core from 147.75.109.163 port 48532 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:39:32.624000 audit[1376]: CRED_ACQ pid=1376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:32.624000 audit[1376]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcdb2bf40 a2=3 a3=0 items=0 ppid=1 pid=1376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:32.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:39:32.626076 sshd[1376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:39:32.633025 systemd-logind[1180]: New session 9 of user core. Jul 16 12:39:32.633978 systemd[1]: Started session-9.scope. Jul 16 12:39:32.640000 audit[1376]: USER_START pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:32.643000 audit[1378]: CRED_ACQ pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:39:33.099000 audit[1379]: USER_ACCT pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:33.100543 sudo[1379]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 16 12:39:33.100000 audit[1379]: CRED_REFR pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:33.101639 sudo[1379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:39:33.105000 audit[1379]: USER_START pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:39:33.148646 systemd[1]: Starting docker.service... Jul 16 12:39:33.217519 env[1389]: time="2025-07-16T12:39:33.217371207Z" level=info msg="Starting up" Jul 16 12:39:33.221749 env[1389]: time="2025-07-16T12:39:33.221704565Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 16 12:39:33.221931 env[1389]: time="2025-07-16T12:39:33.221900200Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 16 12:39:33.222115 env[1389]: time="2025-07-16T12:39:33.222068275Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 16 12:39:33.222259 env[1389]: time="2025-07-16T12:39:33.222229829Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 16 12:39:33.227696 env[1389]: time="2025-07-16T12:39:33.227649261Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 16 12:39:33.227696 env[1389]: time="2025-07-16T12:39:33.227682981Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 16 12:39:33.227922 env[1389]: time="2025-07-16T12:39:33.227705930Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 16 12:39:33.227922 env[1389]: time="2025-07-16T12:39:33.227727442Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 16 12:39:33.261676 env[1389]: time="2025-07-16T12:39:33.261625049Z" level=info msg="Loading containers: start." Jul 16 12:39:33.359000 audit[1422]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.359000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd5aeef840 a2=0 a3=7ffd5aeef82c items=0 ppid=1389 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 16 12:39:33.363000 audit[1424]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.363000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffa60782b0 a2=0 a3=7fffa607829c items=0 ppid=1389 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.363000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 16 12:39:33.366000 audit[1426]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.366000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffca3a5b230 a2=0 a3=7ffca3a5b21c items=0 ppid=1389 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.366000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 16 12:39:33.369000 audit[1428]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.369000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd6d7f6770 a2=0 a3=7ffd6d7f675c items=0 ppid=1389 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.369000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 16 12:39:33.373000 audit[1430]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.373000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd63229ce0 a2=0 a3=7ffd63229ccc items=0 ppid=1389 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 16 12:39:33.394000 audit[1435]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.394000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc02d93170 a2=0 a3=7ffc02d9315c items=0 ppid=1389 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 16 12:39:33.414000 audit[1437]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.414000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcce08de90 a2=0 a3=7ffcce08de7c items=0 ppid=1389 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.414000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 16 12:39:33.417000 audit[1439]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.417000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcf029bdd0 a2=0 a3=7ffcf029bdbc items=0 ppid=1389 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.417000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 16 12:39:33.420000 audit[1441]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.420000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc19b5b020 a2=0 a3=7ffc19b5b00c items=0 ppid=1389 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.420000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 16 12:39:33.431000 audit[1445]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.431000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd5fc4f590 a2=0 a3=7ffd5fc4f57c items=0 ppid=1389 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 16 12:39:33.436000 audit[1446]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.436000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffddc915640 a2=0 a3=7ffddc91562c items=0 ppid=1389 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 16 12:39:33.450895 kernel: Initializing XFRM netlink socket Jul 16 12:39:33.495170 env[1389]: time="2025-07-16T12:39:33.495107265Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 16 12:39:33.549000 audit[1454]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.549000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffda4d1d2c0 a2=0 a3=7ffda4d1d2ac items=0 ppid=1389 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.549000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 16 12:39:33.563000 audit[1457]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.563000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff81ea6080 a2=0 a3=7fff81ea606c items=0 ppid=1389 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 16 12:39:33.569000 audit[1460]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.569000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff8b1e19f0 a2=0 a3=7fff8b1e19dc items=0 ppid=1389 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.569000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 16 12:39:33.572000 audit[1462]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.572000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc06db6560 a2=0 a3=7ffc06db654c items=0 ppid=1389 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 16 12:39:33.576000 audit[1464]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.576000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd4f721af0 a2=0 a3=7ffd4f721adc items=0 ppid=1389 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 16 12:39:33.579000 audit[1466]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.579000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc04a03a10 a2=0 a3=7ffc04a039fc items=0 ppid=1389 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 16 12:39:33.583000 audit[1468]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.583000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca5b40470 a2=0 a3=7ffca5b4045c items=0 ppid=1389 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 16 12:39:33.595000 audit[1471]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.595000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc3ab7c100 a2=0 a3=7ffc3ab7c0ec items=0 ppid=1389 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 16 12:39:33.598000 audit[1473]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.598000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffecf1e0db0 a2=0 a3=7ffecf1e0d9c items=0 ppid=1389 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 16 12:39:33.602000 audit[1475]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.602000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe44307750 a2=0 a3=7ffe4430773c items=0 ppid=1389 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 16 12:39:33.605000 audit[1477]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.605000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffffa24e710 a2=0 a3=7ffffa24e6fc items=0 ppid=1389 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 16 12:39:33.607302 systemd-networkd[1024]: docker0: Link UP Jul 16 12:39:33.664000 audit[1481]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.664000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc802332e0 a2=0 a3=7ffc802332cc items=0 ppid=1389 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 16 12:39:33.669000 audit[1482]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:39:33.669000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdd8ad1360 a2=0 a3=7ffdd8ad134c items=0 ppid=1389 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:39:33.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 16 12:39:33.671047 env[1389]: time="2025-07-16T12:39:33.671007808Z" level=info msg="Loading containers: done." Jul 16 12:39:33.696753 env[1389]: time="2025-07-16T12:39:33.696703236Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 16 12:39:33.697292 env[1389]: time="2025-07-16T12:39:33.697260572Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 16 12:39:33.697575 env[1389]: time="2025-07-16T12:39:33.697546878Z" level=info msg="Daemon has completed initialization" Jul 16 12:39:33.717123 systemd[1]: Started docker.service. Jul 16 12:39:33.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:33.726109 env[1389]: time="2025-07-16T12:39:33.726027386Z" level=info msg="API listen on /run/docker.sock" Jul 16 12:39:34.947513 env[1190]: time="2025-07-16T12:39:34.946744161Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.11\"" Jul 16 12:39:35.800140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3287382934.mount: Deactivated successfully. Jul 16 12:39:37.901973 env[1190]: time="2025-07-16T12:39:37.901791697Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:37.905024 env[1190]: time="2025-07-16T12:39:37.904989248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ea7fa3cfabed1b85e7de8e0a02356b6dcb7708442d6e4600d68abaebe1e9b1fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:37.907420 env[1190]: time="2025-07-16T12:39:37.907372614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:37.910491 env[1190]: time="2025-07-16T12:39:37.910455940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:a3d1c4440817725a1b503a7ccce94f3dce2b208ebf257b405dc2d97817df3dde,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:37.911629 env[1190]: time="2025-07-16T12:39:37.911580253Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.11\" returns image reference \"sha256:ea7fa3cfabed1b85e7de8e0a02356b6dcb7708442d6e4600d68abaebe1e9b1fc\"" Jul 16 12:39:37.913356 env[1190]: time="2025-07-16T12:39:37.913315207Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.11\"" Jul 16 12:39:38.671799 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 16 12:39:38.679471 kernel: kauditd_printk_skb: 84 callbacks suppressed Jul 16 12:39:38.679618 kernel: audit: type=1131 audit(1752669578.671:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:38.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:38.696000 audit: BPF prog-id=40 op=UNLOAD Jul 16 12:39:38.696000 audit: BPF prog-id=39 op=UNLOAD Jul 16 12:39:38.702455 kernel: audit: type=1334 audit(1752669578.696:245): prog-id=40 op=UNLOAD Jul 16 12:39:38.702575 kernel: audit: type=1334 audit(1752669578.696:246): prog-id=39 op=UNLOAD Jul 16 12:39:38.702660 kernel: audit: type=1334 audit(1752669578.696:247): prog-id=38 op=UNLOAD Jul 16 12:39:38.696000 audit: BPF prog-id=38 op=UNLOAD Jul 16 12:39:40.358006 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 16 12:39:40.369571 kernel: audit: type=1130 audit(1752669580.357:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:40.369673 kernel: audit: type=1131 audit(1752669580.357:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:40.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:40.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:40.358398 systemd[1]: Stopped kubelet.service. Jul 16 12:39:40.362022 systemd[1]: Starting kubelet.service... Jul 16 12:39:40.553712 systemd[1]: Started kubelet.service. Jul 16 12:39:40.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:40.561288 kernel: audit: type=1130 audit(1752669580.553:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:40.676475 kubelet[1522]: E0716 12:39:40.676285 1522 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:39:40.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:39:40.678758 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:39:40.679045 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:39:40.684943 kernel: audit: type=1131 audit(1752669580.678:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:39:40.813995 env[1190]: time="2025-07-16T12:39:40.813857068Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:40.817782 env[1190]: time="2025-07-16T12:39:40.817033477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c057eceea4b436b01f9ce394734cfb06f13b2a3688c3983270e99743370b6051,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:40.819883 env[1190]: time="2025-07-16T12:39:40.819816683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:40.822949 env[1190]: time="2025-07-16T12:39:40.822899524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:0f19de157f3d251f5ddeb6e9d026895bc55cb02592874b326fa345c57e5e2848,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:40.825736 env[1190]: time="2025-07-16T12:39:40.824540920Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.11\" returns image reference \"sha256:c057eceea4b436b01f9ce394734cfb06f13b2a3688c3983270e99743370b6051\"" Jul 16 12:39:40.827564 env[1190]: time="2025-07-16T12:39:40.827517000Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.11\"" Jul 16 12:39:43.465226 env[1190]: time="2025-07-16T12:39:43.464973534Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:43.469420 env[1190]: time="2025-07-16T12:39:43.469384309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:64e6a0b453108c87da0bb61473b35fd54078119a09edc56a4c8cb31602437c58,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:43.472050 env[1190]: time="2025-07-16T12:39:43.471948977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:43.474643 env[1190]: time="2025-07-16T12:39:43.474582742Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a9b59b3bfa6c1f1911f6f865a795620c461d079e413061bb71981cadd67f39d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:43.476201 env[1190]: time="2025-07-16T12:39:43.476111074Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.11\" returns image reference \"sha256:64e6a0b453108c87da0bb61473b35fd54078119a09edc56a4c8cb31602437c58\"" Jul 16 12:39:43.477590 env[1190]: time="2025-07-16T12:39:43.477546718Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.11\"" Jul 16 12:39:45.426527 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount503078606.mount: Deactivated successfully. Jul 16 12:39:46.552507 env[1190]: time="2025-07-16T12:39:46.552367802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:46.555394 env[1190]: time="2025-07-16T12:39:46.555358169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0cec28fd5c3c446ec52e2886ddea38bf7f7e17755aa5d0095d50d3df5914a8fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:46.558240 env[1190]: time="2025-07-16T12:39:46.558201689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:46.561034 env[1190]: time="2025-07-16T12:39:46.560998723Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a31da847792c5e7e92e91b78da1ad21d693e4b2b48d0e9f4610c8764dc2a5d79,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:46.561982 env[1190]: time="2025-07-16T12:39:46.561931321Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.11\" returns image reference \"sha256:0cec28fd5c3c446ec52e2886ddea38bf7f7e17755aa5d0095d50d3df5914a8fd\"" Jul 16 12:39:46.563478 env[1190]: time="2025-07-16T12:39:46.563443808Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Jul 16 12:39:47.513211 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2762573903.mount: Deactivated successfully. Jul 16 12:39:49.101475 env[1190]: time="2025-07-16T12:39:49.101374069Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:49.104951 env[1190]: time="2025-07-16T12:39:49.104904606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:49.108173 env[1190]: time="2025-07-16T12:39:49.108129290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:49.111224 env[1190]: time="2025-07-16T12:39:49.111162229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:49.114859 env[1190]: time="2025-07-16T12:39:49.113211568Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Jul 16 12:39:49.116671 env[1190]: time="2025-07-16T12:39:49.116627965Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Jul 16 12:39:50.355143 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount263015872.mount: Deactivated successfully. Jul 16 12:39:50.362651 env[1190]: time="2025-07-16T12:39:50.362583120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:50.364619 env[1190]: time="2025-07-16T12:39:50.364582340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:50.366307 env[1190]: time="2025-07-16T12:39:50.366270411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:50.368214 env[1190]: time="2025-07-16T12:39:50.368173048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:50.369277 env[1190]: time="2025-07-16T12:39:50.369235054Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Jul 16 12:39:50.370191 env[1190]: time="2025-07-16T12:39:50.370156631Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Jul 16 12:39:50.857616 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 16 12:39:50.869151 kernel: audit: type=1130 audit(1752669590.857:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:50.869368 kernel: audit: type=1131 audit(1752669590.857:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:50.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:50.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:50.858069 systemd[1]: Stopped kubelet.service. Jul 16 12:39:50.862369 systemd[1]: Starting kubelet.service... Jul 16 12:39:51.076320 systemd[1]: Started kubelet.service. Jul 16 12:39:51.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:51.082931 kernel: audit: type=1130 audit(1752669591.076:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:39:51.148976 kubelet[1533]: E0716 12:39:51.148724 1533 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:39:51.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:39:51.151787 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:39:51.152069 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:39:51.158999 kernel: audit: type=1131 audit(1752669591.151:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:39:51.585243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2569545321.mount: Deactivated successfully. Jul 16 12:39:52.096060 update_engine[1182]: I0716 12:39:52.095233 1182 update_attempter.cc:509] Updating boot flags... Jul 16 12:39:55.910709 env[1190]: time="2025-07-16T12:39:55.910484580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:55.920052 env[1190]: time="2025-07-16T12:39:55.919973019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:55.922808 env[1190]: time="2025-07-16T12:39:55.922685290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:55.926472 env[1190]: time="2025-07-16T12:39:55.926406866Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:39:55.927947 env[1190]: time="2025-07-16T12:39:55.927843907Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Jul 16 12:40:01.019388 systemd[1]: Stopped kubelet.service. Jul 16 12:40:01.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:01.027026 kernel: audit: type=1130 audit(1752669601.019:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:01.025632 systemd[1]: Starting kubelet.service... Jul 16 12:40:01.034155 kernel: audit: type=1131 audit(1752669601.019:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:01.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:01.069893 systemd[1]: Reloading. Jul 16 12:40:01.228586 /usr/lib/systemd/system-generators/torcx-generator[1599]: time="2025-07-16T12:40:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:40:01.228650 /usr/lib/systemd/system-generators/torcx-generator[1599]: time="2025-07-16T12:40:01Z" level=info msg="torcx already run" Jul 16 12:40:01.340587 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:40:01.340625 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:40:01.374848 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:40:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.495599 kernel: audit: type=1400 audit(1752669601.484:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.495684 kernel: audit: type=1400 audit(1752669601.484:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.504490 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 16 12:40:01.504661 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 16 12:40:01.504722 kernel: audit: backlog limit exceeded Jul 16 12:40:01.507091 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 16 12:40:01.507183 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jul 16 12:40:01.510068 kernel: audit: backlog limit exceeded Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.495000 audit: BPF prog-id=43 op=LOAD Jul 16 12:40:01.495000 audit: BPF prog-id=24 op=UNLOAD Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit: BPF prog-id=44 op=LOAD Jul 16 12:40:01.496000 audit: BPF prog-id=25 op=UNLOAD Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit: BPF prog-id=45 op=LOAD Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.496000 audit: BPF prog-id=46 op=LOAD Jul 16 12:40:01.496000 audit: BPF prog-id=26 op=UNLOAD Jul 16 12:40:01.496000 audit: BPF prog-id=27 op=UNLOAD Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.497000 audit: BPF prog-id=47 op=LOAD Jul 16 12:40:01.497000 audit: BPF prog-id=34 op=UNLOAD Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit: BPF prog-id=35 op=UNLOAD Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit: BPF prog-id=49 op=LOAD Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.509000 audit: BPF prog-id=50 op=LOAD Jul 16 12:40:01.509000 audit: BPF prog-id=36 op=UNLOAD Jul 16 12:40:01.510000 audit: BPF prog-id=37 op=UNLOAD Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.511000 audit: BPF prog-id=51 op=LOAD Jul 16 12:40:01.512000 audit: BPF prog-id=41 op=UNLOAD Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.512000 audit: BPF prog-id=52 op=LOAD Jul 16 12:40:01.512000 audit: BPF prog-id=28 op=UNLOAD Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit: BPF prog-id=53 op=LOAD Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.513000 audit: BPF prog-id=54 op=LOAD Jul 16 12:40:01.513000 audit: BPF prog-id=29 op=UNLOAD Jul 16 12:40:01.513000 audit: BPF prog-id=30 op=UNLOAD Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.517000 audit: BPF prog-id=55 op=LOAD Jul 16 12:40:01.517000 audit: BPF prog-id=33 op=UNLOAD Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit: BPF prog-id=56 op=LOAD Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:01.519000 audit: BPF prog-id=57 op=LOAD Jul 16 12:40:01.519000 audit: BPF prog-id=31 op=UNLOAD Jul 16 12:40:01.519000 audit: BPF prog-id=32 op=UNLOAD Jul 16 12:40:01.543201 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 16 12:40:01.543354 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 16 12:40:01.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:40:01.543711 systemd[1]: Stopped kubelet.service. Jul 16 12:40:01.547111 systemd[1]: Starting kubelet.service... Jul 16 12:40:01.691466 systemd[1]: Started kubelet.service. Jul 16 12:40:01.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:01.791312 kubelet[1647]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 16 12:40:01.791995 kubelet[1647]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 16 12:40:01.791995 kubelet[1647]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 16 12:40:01.792247 kubelet[1647]: I0716 12:40:01.792155 1647 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 16 12:40:02.447890 kubelet[1647]: I0716 12:40:02.447797 1647 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 16 12:40:02.447890 kubelet[1647]: I0716 12:40:02.447852 1647 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 16 12:40:02.448728 kubelet[1647]: I0716 12:40:02.448689 1647 server.go:934] "Client rotation is on, will bootstrap in background" Jul 16 12:40:02.486190 kubelet[1647]: E0716 12:40:02.486121 1647 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.12.146:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:02.488944 kubelet[1647]: I0716 12:40:02.488915 1647 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 16 12:40:02.499920 kubelet[1647]: E0716 12:40:02.499794 1647 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 16 12:40:02.500233 kubelet[1647]: I0716 12:40:02.500204 1647 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 16 12:40:02.508289 kubelet[1647]: I0716 12:40:02.508249 1647 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 16 12:40:02.515340 kubelet[1647]: I0716 12:40:02.515297 1647 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 16 12:40:02.515904 kubelet[1647]: I0716 12:40:02.515832 1647 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 16 12:40:02.516324 kubelet[1647]: I0716 12:40:02.516033 1647 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-uobsc.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 16 12:40:02.516657 kubelet[1647]: I0716 12:40:02.516631 1647 topology_manager.go:138] "Creating topology manager with none policy" Jul 16 12:40:02.516778 kubelet[1647]: I0716 12:40:02.516757 1647 container_manager_linux.go:300] "Creating device plugin manager" Jul 16 12:40:02.517155 kubelet[1647]: I0716 12:40:02.517131 1647 state_mem.go:36] "Initialized new in-memory state store" Jul 16 12:40:02.526623 kubelet[1647]: I0716 12:40:02.526544 1647 kubelet.go:408] "Attempting to sync node with API server" Jul 16 12:40:02.526923 kubelet[1647]: I0716 12:40:02.526896 1647 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 16 12:40:02.527137 kubelet[1647]: I0716 12:40:02.527112 1647 kubelet.go:314] "Adding apiserver pod source" Jul 16 12:40:02.527339 kubelet[1647]: I0716 12:40:02.527314 1647 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 16 12:40:02.533535 kubelet[1647]: W0716 12:40:02.533119 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.12.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-uobsc.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:02.533535 kubelet[1647]: E0716 12:40:02.533235 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.12.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-uobsc.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:02.534326 kubelet[1647]: W0716 12:40:02.534276 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.12.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:02.534509 kubelet[1647]: E0716 12:40:02.534475 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.12.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:02.534759 kubelet[1647]: I0716 12:40:02.534732 1647 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 16 12:40:02.535573 kubelet[1647]: I0716 12:40:02.535547 1647 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 16 12:40:02.536418 kubelet[1647]: W0716 12:40:02.536393 1647 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 16 12:40:02.545708 kubelet[1647]: I0716 12:40:02.545678 1647 server.go:1274] "Started kubelet" Jul 16 12:40:02.548954 kubelet[1647]: I0716 12:40:02.548889 1647 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 16 12:40:02.551372 kubelet[1647]: I0716 12:40:02.551343 1647 server.go:449] "Adding debug handlers to kubelet server" Jul 16 12:40:02.553730 kubelet[1647]: I0716 12:40:02.553686 1647 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 16 12:40:02.554319 kubelet[1647]: I0716 12:40:02.554294 1647 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 16 12:40:02.557121 kubelet[1647]: E0716 12:40:02.554675 1647 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.12.146:6443/api/v1/namespaces/default/events\": dial tcp 10.230.12.146:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-uobsc.gb1.brightbox.com.1852bbb7ac5b86a7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-uobsc.gb1.brightbox.com,UID:srv-uobsc.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-uobsc.gb1.brightbox.com,},FirstTimestamp:2025-07-16 12:40:02.545632935 +0000 UTC m=+0.837898596,LastTimestamp:2025-07-16 12:40:02.545632935 +0000 UTC m=+0.837898596,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-uobsc.gb1.brightbox.com,}" Jul 16 12:40:02.559000 audit[1647]: AVC avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:02.559000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:02.559000 audit[1647]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009aef90 a1=c0008cc9c0 a2=c0009aef60 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.559000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:02.560858 kubelet[1647]: I0716 12:40:02.560821 1647 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 16 12:40:02.560000 audit[1647]: AVC avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:02.560000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:02.560000 audit[1647]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba35a0 a1=c0008cc9d8 a2=c0009af020 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.560000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:02.561527 kubelet[1647]: I0716 12:40:02.561497 1647 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 16 12:40:02.561767 kubelet[1647]: I0716 12:40:02.561744 1647 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 16 12:40:02.565551 kubelet[1647]: I0716 12:40:02.565512 1647 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 16 12:40:02.569957 kubelet[1647]: E0716 12:40:02.569502 1647 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 16 12:40:02.575153 kubelet[1647]: E0716 12:40:02.571227 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:02.575153 kubelet[1647]: I0716 12:40:02.571301 1647 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 16 12:40:02.575153 kubelet[1647]: I0716 12:40:02.571661 1647 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 16 12:40:02.575153 kubelet[1647]: I0716 12:40:02.571766 1647 reconciler.go:26] "Reconciler: start to sync state" Jul 16 12:40:02.575153 kubelet[1647]: I0716 12:40:02.572709 1647 factory.go:221] Registration of the systemd container factory successfully Jul 16 12:40:02.575153 kubelet[1647]: I0716 12:40:02.572824 1647 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 16 12:40:02.575153 kubelet[1647]: W0716 12:40:02.573446 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.12.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:02.575153 kubelet[1647]: E0716 12:40:02.573502 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.12.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:02.575153 kubelet[1647]: I0716 12:40:02.574909 1647 factory.go:221] Registration of the containerd container factory successfully Jul 16 12:40:02.576000 audit[1658]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.576000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3285c7f0 a2=0 a3=7ffd3285c7dc items=0 ppid=1647 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 16 12:40:02.579000 audit[1659]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.579000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc48504480 a2=0 a3=7ffc4850446c items=0 ppid=1647 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 16 12:40:02.583000 audit[1661]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.583000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff572c3ac0 a2=0 a3=7fff572c3aac items=0 ppid=1647 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:40:02.586000 audit[1663]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.586000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe01b85ce0 a2=0 a3=7ffe01b85ccc items=0 ppid=1647 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:40:02.600000 audit[1666]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.600000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd01fe30c0 a2=0 a3=7ffd01fe30ac items=0 ppid=1647 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 16 12:40:02.602723 kubelet[1647]: E0716 12:40:02.602643 1647 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.12.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-uobsc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.12.146:6443: connect: connection refused" interval="200ms" Jul 16 12:40:02.603096 kubelet[1647]: I0716 12:40:02.602987 1647 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 16 12:40:02.605000 audit[1671]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.605000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91b76720 a2=0 a3=7ffd91b7670c items=0 ppid=1647 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 16 12:40:02.607000 audit[1672]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.607000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf6e69c50 a2=0 a3=7ffdf6e69c3c items=0 ppid=1647 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 16 12:40:02.609000 audit[1674]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:02.609000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb5fac580 a2=0 a3=7ffcb5fac56c items=0 ppid=1647 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 16 12:40:02.610000 audit[1669]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:02.610000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd84b889d0 a2=0 a3=7ffd84b889bc items=0 ppid=1647 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 16 12:40:02.612230 kubelet[1647]: I0716 12:40:02.612191 1647 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 16 12:40:02.612389 kubelet[1647]: I0716 12:40:02.612364 1647 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 16 12:40:02.612547 kubelet[1647]: I0716 12:40:02.612521 1647 kubelet.go:2321] "Starting kubelet main sync loop" Jul 16 12:40:02.612769 kubelet[1647]: E0716 12:40:02.612712 1647 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 16 12:40:02.614622 kubelet[1647]: W0716 12:40:02.614555 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.12.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:02.614732 kubelet[1647]: E0716 12:40:02.614625 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.12.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:02.614000 audit[1675]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:02.614000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf5449b10 a2=0 a3=7ffdf5449afc items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 16 12:40:02.617000 audit[1679]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:02.617000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe791c0eb0 a2=0 a3=7ffe791c0e9c items=0 ppid=1647 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 16 12:40:02.619000 audit[1680]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:02.619000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffccfb8c6e0 a2=0 a3=7ffccfb8c6cc items=0 ppid=1647 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 16 12:40:02.624271 kubelet[1647]: I0716 12:40:02.624240 1647 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 16 12:40:02.624271 kubelet[1647]: I0716 12:40:02.624267 1647 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 16 12:40:02.624450 kubelet[1647]: I0716 12:40:02.624307 1647 state_mem.go:36] "Initialized new in-memory state store" Jul 16 12:40:02.627472 kubelet[1647]: I0716 12:40:02.627445 1647 policy_none.go:49] "None policy: Start" Jul 16 12:40:02.628411 kubelet[1647]: I0716 12:40:02.628360 1647 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 16 12:40:02.628589 kubelet[1647]: I0716 12:40:02.628566 1647 state_mem.go:35] "Initializing new in-memory state store" Jul 16 12:40:02.642903 systemd[1]: Created slice kubepods.slice. Jul 16 12:40:02.651167 systemd[1]: Created slice kubepods-burstable.slice. Jul 16 12:40:02.656875 systemd[1]: Created slice kubepods-besteffort.slice. Jul 16 12:40:02.664104 kubelet[1647]: I0716 12:40:02.664071 1647 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 16 12:40:02.663000 audit[1647]: AVC avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:02.663000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:02.663000 audit[1647]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000889950 a1=c000cfd7b8 a2=c000889920 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:02.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:02.665479 kubelet[1647]: I0716 12:40:02.665346 1647 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 16 12:40:02.665783 kubelet[1647]: I0716 12:40:02.665760 1647 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 16 12:40:02.665961 kubelet[1647]: I0716 12:40:02.665902 1647 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 16 12:40:02.668358 kubelet[1647]: I0716 12:40:02.667989 1647 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 16 12:40:02.669207 kubelet[1647]: E0716 12:40:02.669166 1647 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:02.727208 systemd[1]: Created slice kubepods-burstable-pod43bb314d3ba7b3c13b3669763710e65f.slice. Jul 16 12:40:02.742629 systemd[1]: Created slice kubepods-burstable-pod93c0d44c6f0d969ccb95f805b6f7fdbd.slice. Jul 16 12:40:02.753479 systemd[1]: Created slice kubepods-burstable-podc362f577ae4aa1c2ea77ec26f2cdf3c5.slice. Jul 16 12:40:02.769760 kubelet[1647]: I0716 12:40:02.769680 1647 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.770446 kubelet[1647]: E0716 12:40:02.770381 1647 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.12.146:6443/api/v1/nodes\": dial tcp 10.230.12.146:6443: connect: connection refused" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.773120 kubelet[1647]: I0716 12:40:02.773088 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-ca-certs\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.803792 kubelet[1647]: E0716 12:40:02.803731 1647 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.12.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-uobsc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.12.146:6443: connect: connection refused" interval="400ms" Jul 16 12:40:02.874302 kubelet[1647]: I0716 12:40:02.874242 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-flexvolume-dir\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.874606 kubelet[1647]: I0716 12:40:02.874576 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-kubeconfig\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.874758 kubelet[1647]: I0716 12:40:02.874727 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.874957 kubelet[1647]: I0716 12:40:02.874928 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c362f577ae4aa1c2ea77ec26f2cdf3c5-ca-certs\") pod \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" (UID: \"c362f577ae4aa1c2ea77ec26f2cdf3c5\") " pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.875134 kubelet[1647]: I0716 12:40:02.875107 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c362f577ae4aa1c2ea77ec26f2cdf3c5-usr-share-ca-certificates\") pod \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" (UID: \"c362f577ae4aa1c2ea77ec26f2cdf3c5\") " pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.875344 kubelet[1647]: I0716 12:40:02.875315 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-k8s-certs\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.875484 kubelet[1647]: I0716 12:40:02.875457 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/93c0d44c6f0d969ccb95f805b6f7fdbd-kubeconfig\") pod \"kube-scheduler-srv-uobsc.gb1.brightbox.com\" (UID: \"93c0d44c6f0d969ccb95f805b6f7fdbd\") " pod="kube-system/kube-scheduler-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.875629 kubelet[1647]: I0716 12:40:02.875601 1647 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c362f577ae4aa1c2ea77ec26f2cdf3c5-k8s-certs\") pod \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" (UID: \"c362f577ae4aa1c2ea77ec26f2cdf3c5\") " pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.974144 kubelet[1647]: I0716 12:40:02.974103 1647 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:02.974845 kubelet[1647]: E0716 12:40:02.974805 1647 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.12.146:6443/api/v1/nodes\": dial tcp 10.230.12.146:6443: connect: connection refused" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:03.046257 env[1190]: time="2025-07-16T12:40:03.045386664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-uobsc.gb1.brightbox.com,Uid:43bb314d3ba7b3c13b3669763710e65f,Namespace:kube-system,Attempt:0,}" Jul 16 12:40:03.050572 env[1190]: time="2025-07-16T12:40:03.050488539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-uobsc.gb1.brightbox.com,Uid:93c0d44c6f0d969ccb95f805b6f7fdbd,Namespace:kube-system,Attempt:0,}" Jul 16 12:40:03.058875 env[1190]: time="2025-07-16T12:40:03.058747597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-uobsc.gb1.brightbox.com,Uid:c362f577ae4aa1c2ea77ec26f2cdf3c5,Namespace:kube-system,Attempt:0,}" Jul 16 12:40:03.206102 kubelet[1647]: E0716 12:40:03.205997 1647 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.12.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-uobsc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.12.146:6443: connect: connection refused" interval="800ms" Jul 16 12:40:03.377825 kubelet[1647]: I0716 12:40:03.377719 1647 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:03.378723 kubelet[1647]: E0716 12:40:03.378684 1647 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.12.146:6443/api/v1/nodes\": dial tcp 10.230.12.146:6443: connect: connection refused" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:03.434772 kubelet[1647]: W0716 12:40:03.434691 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.12.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-uobsc.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:03.435100 kubelet[1647]: E0716 12:40:03.435066 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.12.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-uobsc.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:03.605516 kubelet[1647]: W0716 12:40:03.605446 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.12.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:03.605828 kubelet[1647]: E0716 12:40:03.605518 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.12.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:03.661162 kubelet[1647]: W0716 12:40:03.660955 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.12.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:03.661162 kubelet[1647]: E0716 12:40:03.661069 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.12.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:04.007038 kubelet[1647]: E0716 12:40:04.006841 1647 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.12.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-uobsc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.12.146:6443: connect: connection refused" interval="1.6s" Jul 16 12:40:04.157600 kubelet[1647]: W0716 12:40:04.157542 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.12.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:04.157840 kubelet[1647]: E0716 12:40:04.157610 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.12.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:04.182394 kubelet[1647]: I0716 12:40:04.182343 1647 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:04.182806 kubelet[1647]: E0716 12:40:04.182756 1647 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.12.146:6443/api/v1/nodes\": dial tcp 10.230.12.146:6443: connect: connection refused" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:04.509011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3148923783.mount: Deactivated successfully. Jul 16 12:40:04.517230 env[1190]: time="2025-07-16T12:40:04.517176352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.522270 env[1190]: time="2025-07-16T12:40:04.522230579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.524304 env[1190]: time="2025-07-16T12:40:04.524269550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.526268 env[1190]: time="2025-07-16T12:40:04.526200101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.528488 env[1190]: time="2025-07-16T12:40:04.528441510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.529479 env[1190]: time="2025-07-16T12:40:04.529432996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.530415 env[1190]: time="2025-07-16T12:40:04.530380030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.534618 env[1190]: time="2025-07-16T12:40:04.534581053Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.538520 env[1190]: time="2025-07-16T12:40:04.538482755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.539755 env[1190]: time="2025-07-16T12:40:04.539714475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.544445 env[1190]: time="2025-07-16T12:40:04.544408329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.555511 env[1190]: time="2025-07-16T12:40:04.555470407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:04.570383 env[1190]: time="2025-07-16T12:40:04.570239236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:04.570658 env[1190]: time="2025-07-16T12:40:04.570412278Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:04.570658 env[1190]: time="2025-07-16T12:40:04.570493567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:04.571145 env[1190]: time="2025-07-16T12:40:04.571069804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4151d577e38ba0b4643477064b30644afe35eabe7b9e5cf5a4a696fa2ee44e29 pid=1689 runtime=io.containerd.runc.v2 Jul 16 12:40:04.608945 systemd[1]: Started cri-containerd-4151d577e38ba0b4643477064b30644afe35eabe7b9e5cf5a4a696fa2ee44e29.scope. Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.639000 audit: BPF prog-id=58 op=LOAD Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1689 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353164353737653338626130623436343334373730363462333036 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1689 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353164353737653338626130623436343334373730363462333036 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit: BPF prog-id=59 op=LOAD Jul 16 12:40:04.640000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a9750 items=0 ppid=1689 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353164353737653338626130623436343334373730363462333036 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit: BPF prog-id=60 op=LOAD Jul 16 12:40:04.640000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a9798 items=0 ppid=1689 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353164353737653338626130623436343334373730363462333036 Jul 16 12:40:04.640000 audit: BPF prog-id=60 op=UNLOAD Jul 16 12:40:04.640000 audit: BPF prog-id=59 op=UNLOAD Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.640000 audit: BPF prog-id=61 op=LOAD Jul 16 12:40:04.640000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a9ba8 items=0 ppid=1689 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431353164353737653338626130623436343334373730363462333036 Jul 16 12:40:04.655565 env[1190]: time="2025-07-16T12:40:04.655443600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:04.656333 env[1190]: time="2025-07-16T12:40:04.656281533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:04.656434 env[1190]: time="2025-07-16T12:40:04.656345419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:04.656589 env[1190]: time="2025-07-16T12:40:04.656538543Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f9af5e9765fb746320fea48aaa81306dd67bd1a01026835e43bd6e412b1ee5b pid=1734 runtime=io.containerd.runc.v2 Jul 16 12:40:04.670750 kubelet[1647]: E0716 12:40:04.664996 1647 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.12.146:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:04.670930 env[1190]: time="2025-07-16T12:40:04.664359985Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:04.670930 env[1190]: time="2025-07-16T12:40:04.664426883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:04.670930 env[1190]: time="2025-07-16T12:40:04.664445551Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:04.670930 env[1190]: time="2025-07-16T12:40:04.664599740Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57e7f87e83ed63eb43fe0ef68b713d02cb81daf66ddd16b0b9fc35bc26ef14c6 pid=1723 runtime=io.containerd.runc.v2 Jul 16 12:40:04.685424 systemd[1]: Started cri-containerd-9f9af5e9765fb746320fea48aaa81306dd67bd1a01026835e43bd6e412b1ee5b.scope. Jul 16 12:40:04.706348 systemd[1]: Started cri-containerd-57e7f87e83ed63eb43fe0ef68b713d02cb81daf66ddd16b0b9fc35bc26ef14c6.scope. Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit: BPF prog-id=62 op=LOAD Jul 16 12:40:04.736000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.736000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1734 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396166356539373635666237343633323066656134386161613831 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1734 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396166356539373635666237343633323066656134386161613831 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit: BPF prog-id=63 op=LOAD Jul 16 12:40:04.737000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c3000 items=0 ppid=1734 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396166356539373635666237343633323066656134386161613831 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit: BPF prog-id=64 op=LOAD Jul 16 12:40:04.737000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c3048 items=0 ppid=1734 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396166356539373635666237343633323066656134386161613831 Jul 16 12:40:04.737000 audit: BPF prog-id=64 op=UNLOAD Jul 16 12:40:04.737000 audit: BPF prog-id=63 op=UNLOAD Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { perfmon } for pid=1746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit[1746]: AVC avc: denied { bpf } for pid=1746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.737000 audit: BPF prog-id=65 op=LOAD Jul 16 12:40:04.737000 audit[1746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c3458 items=0 ppid=1734 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966396166356539373635666237343633323066656134386161613831 Jul 16 12:40:04.750581 env[1190]: time="2025-07-16T12:40:04.750512196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-uobsc.gb1.brightbox.com,Uid:c362f577ae4aa1c2ea77ec26f2cdf3c5,Namespace:kube-system,Attempt:0,} returns sandbox id \"4151d577e38ba0b4643477064b30644afe35eabe7b9e5cf5a4a696fa2ee44e29\"" Jul 16 12:40:04.755427 env[1190]: time="2025-07-16T12:40:04.755383011Z" level=info msg="CreateContainer within sandbox \"4151d577e38ba0b4643477064b30644afe35eabe7b9e5cf5a4a696fa2ee44e29\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.761000 audit: BPF prog-id=66 op=LOAD Jul 16 12:40:04.767000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.767000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1723 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653766383765383365643633656234336665306566363862373133 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1723 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653766383765383365643633656234336665306566363862373133 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.768000 audit: BPF prog-id=67 op=LOAD Jul 16 12:40:04.768000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f420 items=0 ppid=1723 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653766383765383365643633656234336665306566363862373133 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.772000 audit: BPF prog-id=68 op=LOAD Jul 16 12:40:04.772000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028f468 items=0 ppid=1723 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653766383765383365643633656234336665306566363862373133 Jul 16 12:40:04.773000 audit: BPF prog-id=68 op=UNLOAD Jul 16 12:40:04.773000 audit: BPF prog-id=67 op=UNLOAD Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.774000 audit: BPF prog-id=69 op=LOAD Jul 16 12:40:04.777940 env[1190]: time="2025-07-16T12:40:04.777733784Z" level=info msg="CreateContainer within sandbox \"4151d577e38ba0b4643477064b30644afe35eabe7b9e5cf5a4a696fa2ee44e29\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7b812e35322cf3d1368d09fe1364ba702414167a7fe6c17b73defe7d68fba5a1\"" Jul 16 12:40:04.774000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f878 items=0 ppid=1723 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.783056 env[1190]: time="2025-07-16T12:40:04.778677566Z" level=info msg="StartContainer for \"7b812e35322cf3d1368d09fe1364ba702414167a7fe6c17b73defe7d68fba5a1\"" Jul 16 12:40:04.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653766383765383365643633656234336665306566363862373133 Jul 16 12:40:04.806999 systemd[1]: Started cri-containerd-7b812e35322cf3d1368d09fe1364ba702414167a7fe6c17b73defe7d68fba5a1.scope. Jul 16 12:40:04.834247 env[1190]: time="2025-07-16T12:40:04.833762224Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-uobsc.gb1.brightbox.com,Uid:93c0d44c6f0d969ccb95f805b6f7fdbd,Namespace:kube-system,Attempt:0,} returns sandbox id \"9f9af5e9765fb746320fea48aaa81306dd67bd1a01026835e43bd6e412b1ee5b\"" Jul 16 12:40:04.837595 env[1190]: time="2025-07-16T12:40:04.837306373Z" level=info msg="CreateContainer within sandbox \"9f9af5e9765fb746320fea48aaa81306dd67bd1a01026835e43bd6e412b1ee5b\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 16 12:40:04.855301 env[1190]: time="2025-07-16T12:40:04.855004558Z" level=info msg="CreateContainer within sandbox \"9f9af5e9765fb746320fea48aaa81306dd67bd1a01026835e43bd6e412b1ee5b\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b10c074c5b7eaeba295d2154db8bcccde7c4257e699dc7630f9dcc582d315087\"" Jul 16 12:40:04.855694 env[1190]: time="2025-07-16T12:40:04.855659390Z" level=info msg="StartContainer for \"b10c074c5b7eaeba295d2154db8bcccde7c4257e699dc7630f9dcc582d315087\"" Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.861000 audit: BPF prog-id=70 op=LOAD Jul 16 12:40:04.862000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.862000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1689 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383132653335333232636633643133363864303966653133363462 Jul 16 12:40:04.862000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.862000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1689 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383132653335333232636633643133363864303966653133363462 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.863000 audit: BPF prog-id=71 op=LOAD Jul 16 12:40:04.863000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098440 items=0 ppid=1689 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383132653335333232636633643133363864303966653133363462 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.864000 audit: BPF prog-id=72 op=LOAD Jul 16 12:40:04.864000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098488 items=0 ppid=1689 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383132653335333232636633643133363864303966653133363462 Jul 16 12:40:04.865000 audit: BPF prog-id=72 op=UNLOAD Jul 16 12:40:04.865000 audit: BPF prog-id=71 op=UNLOAD Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.866000 audit: BPF prog-id=73 op=LOAD Jul 16 12:40:04.866000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098898 items=0 ppid=1689 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383132653335333232636633643133363864303966653133363462 Jul 16 12:40:04.882849 env[1190]: time="2025-07-16T12:40:04.875579632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-uobsc.gb1.brightbox.com,Uid:43bb314d3ba7b3c13b3669763710e65f,Namespace:kube-system,Attempt:0,} returns sandbox id \"57e7f87e83ed63eb43fe0ef68b713d02cb81daf66ddd16b0b9fc35bc26ef14c6\"" Jul 16 12:40:04.886242 env[1190]: time="2025-07-16T12:40:04.886195557Z" level=info msg="CreateContainer within sandbox \"57e7f87e83ed63eb43fe0ef68b713d02cb81daf66ddd16b0b9fc35bc26ef14c6\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 16 12:40:04.902318 env[1190]: time="2025-07-16T12:40:04.902150584Z" level=info msg="CreateContainer within sandbox \"57e7f87e83ed63eb43fe0ef68b713d02cb81daf66ddd16b0b9fc35bc26ef14c6\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d6a36f0507f264b6073198c5c43a639055252e78460745c4cc506256c2f55be7\"" Jul 16 12:40:04.903184 env[1190]: time="2025-07-16T12:40:04.903134870Z" level=info msg="StartContainer for \"d6a36f0507f264b6073198c5c43a639055252e78460745c4cc506256c2f55be7\"" Jul 16 12:40:04.914102 systemd[1]: Started cri-containerd-b10c074c5b7eaeba295d2154db8bcccde7c4257e699dc7630f9dcc582d315087.scope. Jul 16 12:40:04.939684 env[1190]: time="2025-07-16T12:40:04.938407753Z" level=info msg="StartContainer for \"7b812e35322cf3d1368d09fe1364ba702414167a7fe6c17b73defe7d68fba5a1\" returns successfully" Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.943000 audit: BPF prog-id=74 op=LOAD Jul 16 12:40:04.944000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.944000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1734 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306330373463356237656165626132393564323135346462386263 Jul 16 12:40:04.944000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.944000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1734 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306330373463356237656165626132393564323135346462386263 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.945000 audit: BPF prog-id=75 op=LOAD Jul 16 12:40:04.945000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002afd30 items=0 ppid=1734 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306330373463356237656165626132393564323135346462386263 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.947000 audit: BPF prog-id=76 op=LOAD Jul 16 12:40:04.947000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002afd78 items=0 ppid=1734 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306330373463356237656165626132393564323135346462386263 Jul 16 12:40:04.948000 audit: BPF prog-id=76 op=UNLOAD Jul 16 12:40:04.949000 audit: BPF prog-id=75 op=UNLOAD Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.949000 audit: BPF prog-id=77 op=LOAD Jul 16 12:40:04.949000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000332188 items=0 ppid=1734 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:04.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306330373463356237656165626132393564323135346462386263 Jul 16 12:40:04.955567 systemd[1]: Started cri-containerd-d6a36f0507f264b6073198c5c43a639055252e78460745c4cc506256c2f55be7.scope. Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:04.998000 audit: BPF prog-id=78 op=LOAD Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1723 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:05.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613336663035303766323634623630373331393863356334336136 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1723 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:05.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613336663035303766323634623630373331393863356334336136 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit: BPF prog-id=79 op=LOAD Jul 16 12:40:05.003000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028bc00 items=0 ppid=1723 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:05.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613336663035303766323634623630373331393863356334336136 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.003000 audit: BPF prog-id=80 op=LOAD Jul 16 12:40:05.003000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028bc48 items=0 ppid=1723 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:05.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613336663035303766323634623630373331393863356334336136 Jul 16 12:40:05.003000 audit: BPF prog-id=80 op=UNLOAD Jul 16 12:40:05.003000 audit: BPF prog-id=79 op=UNLOAD Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:05.004000 audit: BPF prog-id=81 op=LOAD Jul 16 12:40:05.004000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00040a058 items=0 ppid=1723 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:05.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613336663035303766323634623630373331393863356334336136 Jul 16 12:40:05.007598 env[1190]: time="2025-07-16T12:40:05.003182168Z" level=info msg="StartContainer for \"b10c074c5b7eaeba295d2154db8bcccde7c4257e699dc7630f9dcc582d315087\" returns successfully" Jul 16 12:40:05.054172 env[1190]: time="2025-07-16T12:40:05.053109354Z" level=info msg="StartContainer for \"d6a36f0507f264b6073198c5c43a639055252e78460745c4cc506256c2f55be7\" returns successfully" Jul 16 12:40:05.500763 systemd[1]: run-containerd-runc-k8s.io-4151d577e38ba0b4643477064b30644afe35eabe7b9e5cf5a4a696fa2ee44e29-runc.Iz3pDA.mount: Deactivated successfully. Jul 16 12:40:05.519227 kubelet[1647]: W0716 12:40:05.519146 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.12.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:05.519753 kubelet[1647]: E0716 12:40:05.519239 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.12.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:05.608547 kubelet[1647]: E0716 12:40:05.608478 1647 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.12.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-uobsc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.12.146:6443: connect: connection refused" interval="3.2s" Jul 16 12:40:05.766720 kubelet[1647]: W0716 12:40:05.766198 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.12.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:05.767342 kubelet[1647]: E0716 12:40:05.767281 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.12.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:05.787450 kubelet[1647]: I0716 12:40:05.787413 1647 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:05.788154 kubelet[1647]: E0716 12:40:05.788119 1647 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.12.146:6443/api/v1/nodes\": dial tcp 10.230.12.146:6443: connect: connection refused" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:06.017307 kubelet[1647]: W0716 12:40:06.017137 1647 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.12.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-uobsc.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.12.146:6443: connect: connection refused Jul 16 12:40:06.017590 kubelet[1647]: E0716 12:40:06.017542 1647 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.12.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-uobsc.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.12.146:6443: connect: connection refused" logger="UnhandledError" Jul 16 12:40:07.191880 kernel: kauditd_printk_skb: 560 callbacks suppressed Jul 16 12:40:07.192149 kernel: audit: type=1400 audit(1752669607.182:553): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.182000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.182000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0006ce000 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:07.202894 kernel: audit: type=1300 audit(1752669607.182:553): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0006ce000 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:07.182000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:07.185000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.216296 kernel: audit: type=1327 audit(1752669607.182:553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:07.216407 kernel: audit: type=1400 audit(1752669607.185:554): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.185000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000153e20 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:07.228892 kernel: audit: type=1300 audit(1752669607.185:554): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000153e20 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:07.185000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:07.238890 kernel: audit: type=1327 audit(1752669607.185:554): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:07.955000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526381 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.962895 kernel: audit: type=1400 audit(1752669607.955:555): avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526381 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.956000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.956000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003a98c90 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.978363 kernel: audit: type=1400 audit(1752669607.956:556): avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.978504 kernel: audit: type=1300 audit(1752669607.956:556): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003a98c90 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:07.993925 kernel: audit: type=1327 audit(1752669607.956:556): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:07.956000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.956000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005c00280 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:07.955000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004e38600 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:07.972000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526387 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.972000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c003a99410 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.972000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:07.996000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.996000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c005da6680 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.996000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:07.997000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:07.997000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c004e38db0 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:40:07.997000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:40:08.457987 kubelet[1647]: E0716 12:40:08.457818 1647 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "srv-uobsc.gb1.brightbox.com" not found Jul 16 12:40:08.814029 kubelet[1647]: E0716 12:40:08.813846 1647 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-uobsc.gb1.brightbox.com\" not found" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:08.828753 kubelet[1647]: E0716 12:40:08.828673 1647 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "srv-uobsc.gb1.brightbox.com" not found Jul 16 12:40:08.992223 kubelet[1647]: I0716 12:40:08.992182 1647 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:08.997905 kubelet[1647]: I0716 12:40:08.997853 1647 kubelet_node_status.go:75] "Successfully registered node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:08.998143 kubelet[1647]: E0716 12:40:08.998114 1647 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"srv-uobsc.gb1.brightbox.com\": node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.020033 kubelet[1647]: E0716 12:40:09.019986 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.122324 kubelet[1647]: E0716 12:40:09.122221 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.222852 kubelet[1647]: E0716 12:40:09.222783 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.325897 kubelet[1647]: E0716 12:40:09.325802 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.426650 kubelet[1647]: E0716 12:40:09.426445 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.526784 kubelet[1647]: E0716 12:40:09.526680 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.628552 kubelet[1647]: E0716 12:40:09.628410 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.730078 kubelet[1647]: E0716 12:40:09.729817 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.830677 kubelet[1647]: E0716 12:40:09.830584 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:09.931482 kubelet[1647]: E0716 12:40:09.931353 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.032522 kubelet[1647]: E0716 12:40:10.032373 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.133504 kubelet[1647]: E0716 12:40:10.133435 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.234300 kubelet[1647]: E0716 12:40:10.234232 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.335161 kubelet[1647]: E0716 12:40:10.334981 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.433264 systemd[1]: Reloading. Jul 16 12:40:10.435713 kubelet[1647]: E0716 12:40:10.435662 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.536557 kubelet[1647]: E0716 12:40:10.536497 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.560052 /usr/lib/systemd/system-generators/torcx-generator[1938]: time="2025-07-16T12:40:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:40:10.560755 /usr/lib/systemd/system-generators/torcx-generator[1938]: time="2025-07-16T12:40:10Z" level=info msg="torcx already run" Jul 16 12:40:10.638298 kubelet[1647]: E0716 12:40:10.637483 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.674057 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:40:10.674367 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:40:10.703110 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:40:10.738072 kubelet[1647]: E0716 12:40:10.738016 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.839277 kubelet[1647]: E0716 12:40:10.839036 1647 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:10.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.838000 audit: BPF prog-id=82 op=LOAD Jul 16 12:40:10.839000 audit: BPF prog-id=74 op=UNLOAD Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.840000 audit: BPF prog-id=83 op=LOAD Jul 16 12:40:10.840000 audit: BPF prog-id=70 op=UNLOAD Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.842000 audit: BPF prog-id=84 op=LOAD Jul 16 12:40:10.842000 audit: BPF prog-id=78 op=UNLOAD Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.846000 audit: BPF prog-id=85 op=LOAD Jul 16 12:40:10.846000 audit: BPF prog-id=58 op=UNLOAD Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.847000 audit: BPF prog-id=86 op=LOAD Jul 16 12:40:10.847000 audit: BPF prog-id=43 op=UNLOAD Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit: BPF prog-id=87 op=LOAD Jul 16 12:40:10.848000 audit: BPF prog-id=44 op=UNLOAD Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit: BPF prog-id=88 op=LOAD Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.848000 audit: BPF prog-id=89 op=LOAD Jul 16 12:40:10.849000 audit: BPF prog-id=45 op=UNLOAD Jul 16 12:40:10.849000 audit: BPF prog-id=46 op=UNLOAD Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit: BPF prog-id=90 op=LOAD Jul 16 12:40:10.850000 audit: BPF prog-id=47 op=UNLOAD Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.850000 audit: BPF prog-id=91 op=LOAD Jul 16 12:40:10.850000 audit: BPF prog-id=66 op=UNLOAD Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit: BPF prog-id=92 op=LOAD Jul 16 12:40:10.853000 audit: BPF prog-id=48 op=UNLOAD Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.853000 audit: BPF prog-id=93 op=LOAD Jul 16 12:40:10.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.854000 audit: BPF prog-id=94 op=LOAD Jul 16 12:40:10.854000 audit: BPF prog-id=49 op=UNLOAD Jul 16 12:40:10.854000 audit: BPF prog-id=50 op=UNLOAD Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit: BPF prog-id=95 op=LOAD Jul 16 12:40:10.856000 audit: BPF prog-id=62 op=UNLOAD Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit: BPF prog-id=96 op=LOAD Jul 16 12:40:10.857000 audit: BPF prog-id=51 op=UNLOAD Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit: BPF prog-id=97 op=LOAD Jul 16 12:40:10.858000 audit: BPF prog-id=52 op=UNLOAD Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit: BPF prog-id=98 op=LOAD Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.858000 audit: BPF prog-id=99 op=LOAD Jul 16 12:40:10.858000 audit: BPF prog-id=53 op=UNLOAD Jul 16 12:40:10.858000 audit: BPF prog-id=54 op=UNLOAD Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.862000 audit: BPF prog-id=100 op=LOAD Jul 16 12:40:10.862000 audit: BPF prog-id=55 op=UNLOAD Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit: BPF prog-id=101 op=LOAD Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:10.864000 audit: BPF prog-id=102 op=LOAD Jul 16 12:40:10.864000 audit: BPF prog-id=56 op=UNLOAD Jul 16 12:40:10.864000 audit: BPF prog-id=57 op=UNLOAD Jul 16 12:40:10.897807 systemd[1]: Stopping kubelet.service... Jul 16 12:40:10.914387 systemd[1]: kubelet.service: Deactivated successfully. Jul 16 12:40:10.914740 systemd[1]: Stopped kubelet.service. Jul 16 12:40:10.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:10.914913 systemd[1]: kubelet.service: Consumed 1.118s CPU time. Jul 16 12:40:10.919647 systemd[1]: Starting kubelet.service... Jul 16 12:40:12.248408 systemd[1]: Started kubelet.service. Jul 16 12:40:12.251810 kernel: kauditd_printk_skb: 259 callbacks suppressed Jul 16 12:40:12.251947 kernel: audit: type=1130 audit(1752669612.248:806): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:12.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:12.381399 kubelet[1989]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 16 12:40:12.382056 kubelet[1989]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 16 12:40:12.382160 kubelet[1989]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 16 12:40:12.382479 kubelet[1989]: I0716 12:40:12.382349 1989 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 16 12:40:12.401478 kubelet[1989]: I0716 12:40:12.401083 1989 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 16 12:40:12.401478 kubelet[1989]: I0716 12:40:12.401151 1989 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 16 12:40:12.401754 kubelet[1989]: I0716 12:40:12.401606 1989 server.go:934] "Client rotation is on, will bootstrap in background" Jul 16 12:40:12.404221 kubelet[1989]: I0716 12:40:12.403835 1989 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 16 12:40:12.420747 kubelet[1989]: I0716 12:40:12.420696 1989 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 16 12:40:12.436097 kubelet[1989]: E0716 12:40:12.435161 1989 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 16 12:40:12.436097 kubelet[1989]: I0716 12:40:12.435209 1989 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 16 12:40:12.442322 kubelet[1989]: I0716 12:40:12.442263 1989 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 16 12:40:12.443475 kubelet[1989]: I0716 12:40:12.442527 1989 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 16 12:40:12.443475 kubelet[1989]: I0716 12:40:12.442803 1989 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 16 12:40:12.456361 kubelet[1989]: I0716 12:40:12.442848 1989 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-uobsc.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 16 12:40:12.456361 kubelet[1989]: I0716 12:40:12.456342 1989 topology_manager.go:138] "Creating topology manager with none policy" Jul 16 12:40:12.456361 kubelet[1989]: I0716 12:40:12.456369 1989 container_manager_linux.go:300] "Creating device plugin manager" Jul 16 12:40:12.456836 kubelet[1989]: I0716 12:40:12.456457 1989 state_mem.go:36] "Initialized new in-memory state store" Jul 16 12:40:12.463321 kubelet[1989]: I0716 12:40:12.463288 1989 kubelet.go:408] "Attempting to sync node with API server" Jul 16 12:40:12.463417 kubelet[1989]: I0716 12:40:12.463341 1989 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 16 12:40:12.463417 kubelet[1989]: I0716 12:40:12.463402 1989 kubelet.go:314] "Adding apiserver pod source" Jul 16 12:40:12.463530 kubelet[1989]: I0716 12:40:12.463434 1989 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 16 12:40:12.470185 kubelet[1989]: I0716 12:40:12.469018 1989 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 16 12:40:12.472972 kubelet[1989]: I0716 12:40:12.470936 1989 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 16 12:40:12.472972 kubelet[1989]: I0716 12:40:12.471616 1989 server.go:1274] "Started kubelet" Jul 16 12:40:12.486000 audit[1989]: AVC avc: denied { mac_admin } for pid=1989 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:12.494323 kubelet[1989]: I0716 12:40:12.487776 1989 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 16 12:40:12.494323 kubelet[1989]: I0716 12:40:12.487834 1989 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 16 12:40:12.494323 kubelet[1989]: I0716 12:40:12.487937 1989 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 16 12:40:12.497676 kernel: audit: type=1400 audit(1752669612.486:807): avc: denied { mac_admin } for pid=1989 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:12.497758 kernel: audit: type=1401 audit(1752669612.486:807): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:12.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:12.506006 kernel: audit: type=1300 audit(1752669612.486:807): arch=c000003e syscall=188 success=no exit=-22 a0=c0005845a0 a1=c000b62ee8 a2=c000584540 a3=25 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:12.486000 audit[1989]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005845a0 a1=c000b62ee8 a2=c000584540 a3=25 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:12.506397 kubelet[1989]: I0716 12:40:12.501151 1989 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 16 12:40:12.506397 kubelet[1989]: I0716 12:40:12.502660 1989 server.go:449] "Adding debug handlers to kubelet server" Jul 16 12:40:12.506397 kubelet[1989]: I0716 12:40:12.504241 1989 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 16 12:40:12.506397 kubelet[1989]: I0716 12:40:12.504618 1989 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 16 12:40:12.506397 kubelet[1989]: I0716 12:40:12.505012 1989 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 16 12:40:12.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:12.519231 kubelet[1989]: I0716 12:40:12.518897 1989 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 16 12:40:12.520001 kernel: audit: type=1327 audit(1752669612.486:807): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:12.486000 audit[1989]: AVC avc: denied { mac_admin } for pid=1989 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:12.525284 kubelet[1989]: E0716 12:40:12.522859 1989 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-uobsc.gb1.brightbox.com\" not found" Jul 16 12:40:12.525791 kubelet[1989]: I0716 12:40:12.525764 1989 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 16 12:40:12.525906 kernel: audit: type=1400 audit(1752669612.486:808): avc: denied { mac_admin } for pid=1989 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:12.540147 kernel: audit: type=1401 audit(1752669612.486:808): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:12.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:12.540341 kubelet[1989]: I0716 12:40:12.537303 1989 reconciler.go:26] "Reconciler: start to sync state" Jul 16 12:40:12.486000 audit[1989]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000447a60 a1=c000b62f00 a2=c000584780 a3=25 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:12.551249 kernel: audit: type=1300 audit(1752669612.486:808): arch=c000003e syscall=188 success=no exit=-22 a0=c000447a60 a1=c000b62f00 a2=c000584780 a3=25 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:12.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:12.559000 kernel: audit: type=1327 audit(1752669612.486:808): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:12.582142 kubelet[1989]: I0716 12:40:12.581354 1989 factory.go:221] Registration of the containerd container factory successfully Jul 16 12:40:12.582142 kubelet[1989]: I0716 12:40:12.581386 1989 factory.go:221] Registration of the systemd container factory successfully Jul 16 12:40:12.582142 kubelet[1989]: I0716 12:40:12.581513 1989 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 16 12:40:12.594075 kubelet[1989]: I0716 12:40:12.594030 1989 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 16 12:40:12.602523 kubelet[1989]: I0716 12:40:12.602462 1989 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 16 12:40:12.602523 kubelet[1989]: I0716 12:40:12.602527 1989 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 16 12:40:12.602773 kubelet[1989]: I0716 12:40:12.602563 1989 kubelet.go:2321] "Starting kubelet main sync loop" Jul 16 12:40:12.602773 kubelet[1989]: E0716 12:40:12.602652 1989 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 16 12:40:12.618000 kubelet[1989]: E0716 12:40:12.617811 1989 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 16 12:40:12.702775 kubelet[1989]: E0716 12:40:12.702729 1989 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 16 12:40:12.711714 kubelet[1989]: I0716 12:40:12.711681 1989 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 16 12:40:12.712138 kubelet[1989]: I0716 12:40:12.712111 1989 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 16 12:40:12.712347 kubelet[1989]: I0716 12:40:12.712323 1989 state_mem.go:36] "Initialized new in-memory state store" Jul 16 12:40:12.712940 kubelet[1989]: I0716 12:40:12.712913 1989 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 16 12:40:12.713290 kubelet[1989]: I0716 12:40:12.713197 1989 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 16 12:40:12.713448 kubelet[1989]: I0716 12:40:12.713396 1989 policy_none.go:49] "None policy: Start" Jul 16 12:40:12.715273 kubelet[1989]: I0716 12:40:12.715248 1989 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 16 12:40:12.715469 kubelet[1989]: I0716 12:40:12.715446 1989 state_mem.go:35] "Initializing new in-memory state store" Jul 16 12:40:12.715777 kubelet[1989]: I0716 12:40:12.715752 1989 state_mem.go:75] "Updated machine memory state" Jul 16 12:40:12.726591 kubelet[1989]: I0716 12:40:12.726532 1989 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 16 12:40:12.725000 audit[1989]: AVC avc: denied { mac_admin } for pid=1989 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:12.725000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:40:12.725000 audit[1989]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fc570 a1=c000e9a8e8 a2=c0009fc540 a3=25 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:12.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:40:12.732419 kubelet[1989]: I0716 12:40:12.732128 1989 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 16 12:40:12.732664 kubelet[1989]: I0716 12:40:12.732516 1989 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 16 12:40:12.732664 kubelet[1989]: I0716 12:40:12.732583 1989 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 16 12:40:12.733751 kernel: audit: type=1400 audit(1752669612.725:809): avc: denied { mac_admin } for pid=1989 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:12.733855 kubelet[1989]: I0716 12:40:12.733409 1989 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 16 12:40:12.863812 kubelet[1989]: I0716 12:40:12.863759 1989 kubelet_node_status.go:72] "Attempting to register node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.882734 kubelet[1989]: I0716 12:40:12.880495 1989 kubelet_node_status.go:111] "Node was previously registered" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.882734 kubelet[1989]: I0716 12:40:12.880599 1989 kubelet_node_status.go:75] "Successfully registered node" node="srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.923818 kubelet[1989]: W0716 12:40:12.923776 1989 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 16 12:40:12.925742 kubelet[1989]: W0716 12:40:12.925692 1989 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 16 12:40:12.931116 kubelet[1989]: W0716 12:40:12.931090 1989 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 16 12:40:12.941664 kubelet[1989]: I0716 12:40:12.941630 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/93c0d44c6f0d969ccb95f805b6f7fdbd-kubeconfig\") pod \"kube-scheduler-srv-uobsc.gb1.brightbox.com\" (UID: \"93c0d44c6f0d969ccb95f805b6f7fdbd\") " pod="kube-system/kube-scheduler-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.941913 kubelet[1989]: I0716 12:40:12.941838 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c362f577ae4aa1c2ea77ec26f2cdf3c5-k8s-certs\") pod \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" (UID: \"c362f577ae4aa1c2ea77ec26f2cdf3c5\") " pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.942121 kubelet[1989]: I0716 12:40:12.942082 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c362f577ae4aa1c2ea77ec26f2cdf3c5-usr-share-ca-certificates\") pod \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" (UID: \"c362f577ae4aa1c2ea77ec26f2cdf3c5\") " pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.942329 kubelet[1989]: I0716 12:40:12.942261 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-ca-certs\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.942513 kubelet[1989]: I0716 12:40:12.942487 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-k8s-certs\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.942733 kubelet[1989]: I0716 12:40:12.942681 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.942978 kubelet[1989]: I0716 12:40:12.942941 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c362f577ae4aa1c2ea77ec26f2cdf3c5-ca-certs\") pod \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" (UID: \"c362f577ae4aa1c2ea77ec26f2cdf3c5\") " pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.943190 kubelet[1989]: I0716 12:40:12.943141 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-flexvolume-dir\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:12.943411 kubelet[1989]: I0716 12:40:12.943349 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/43bb314d3ba7b3c13b3669763710e65f-kubeconfig\") pod \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" (UID: \"43bb314d3ba7b3c13b3669763710e65f\") " pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:13.467464 kubelet[1989]: I0716 12:40:13.467393 1989 apiserver.go:52] "Watching apiserver" Jul 16 12:40:13.526354 kubelet[1989]: I0716 12:40:13.526314 1989 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Jul 16 12:40:13.674932 kubelet[1989]: W0716 12:40:13.674888 1989 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 16 12:40:13.675158 kubelet[1989]: E0716 12:40:13.674967 1989 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-uobsc.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:13.675686 kubelet[1989]: W0716 12:40:13.675653 1989 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 16 12:40:13.675783 kubelet[1989]: E0716 12:40:13.675705 1989 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-srv-uobsc.gb1.brightbox.com\" already exists" pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" Jul 16 12:40:13.676957 kubelet[1989]: I0716 12:40:13.676895 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-uobsc.gb1.brightbox.com" podStartSLOduration=1.676854308 podStartE2EDuration="1.676854308s" podCreationTimestamp="2025-07-16 12:40:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-16 12:40:13.663249551 +0000 UTC m=+1.394757096" watchObservedRunningTime="2025-07-16 12:40:13.676854308 +0000 UTC m=+1.408361850" Jul 16 12:40:13.687509 kubelet[1989]: I0716 12:40:13.687435 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-uobsc.gb1.brightbox.com" podStartSLOduration=1.687413015 podStartE2EDuration="1.687413015s" podCreationTimestamp="2025-07-16 12:40:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-16 12:40:13.677199943 +0000 UTC m=+1.408707504" watchObservedRunningTime="2025-07-16 12:40:13.687413015 +0000 UTC m=+1.418920559" Jul 16 12:40:13.698694 kubelet[1989]: I0716 12:40:13.698629 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-uobsc.gb1.brightbox.com" podStartSLOduration=1.698613005 podStartE2EDuration="1.698613005s" podCreationTimestamp="2025-07-16 12:40:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-16 12:40:13.687562054 +0000 UTC m=+1.419069590" watchObservedRunningTime="2025-07-16 12:40:13.698613005 +0000 UTC m=+1.430120549" Jul 16 12:40:14.668000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526412 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 16 12:40:14.668000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a91740 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:14.668000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:15.924000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:15.924000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00163d580 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:15.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:15.925000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:15.925000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00163d740 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:15.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:15.927000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:15.927000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016de9a0 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:15.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:15.927000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:40:15.927000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00163d900 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:40:15.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:40:17.064767 kubelet[1989]: I0716 12:40:17.064612 1989 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 16 12:40:17.066843 env[1190]: time="2025-07-16T12:40:17.066560878Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 16 12:40:17.067433 kubelet[1989]: I0716 12:40:17.067041 1989 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 16 12:40:18.053064 systemd[1]: Created slice kubepods-besteffort-pod4b745135_7167_4d78_abcf_7976b753b313.slice. Jul 16 12:40:18.077923 kubelet[1989]: I0716 12:40:18.077842 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4b745135-7167-4d78-abcf-7976b753b313-lib-modules\") pod \"kube-proxy-4gxdw\" (UID: \"4b745135-7167-4d78-abcf-7976b753b313\") " pod="kube-system/kube-proxy-4gxdw" Jul 16 12:40:18.077923 kubelet[1989]: I0716 12:40:18.077923 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4b745135-7167-4d78-abcf-7976b753b313-kube-proxy\") pod \"kube-proxy-4gxdw\" (UID: \"4b745135-7167-4d78-abcf-7976b753b313\") " pod="kube-system/kube-proxy-4gxdw" Jul 16 12:40:18.078618 kubelet[1989]: I0716 12:40:18.077958 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cz957\" (UniqueName: \"kubernetes.io/projected/4b745135-7167-4d78-abcf-7976b753b313-kube-api-access-cz957\") pod \"kube-proxy-4gxdw\" (UID: \"4b745135-7167-4d78-abcf-7976b753b313\") " pod="kube-system/kube-proxy-4gxdw" Jul 16 12:40:18.078618 kubelet[1989]: I0716 12:40:18.077989 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4b745135-7167-4d78-abcf-7976b753b313-xtables-lock\") pod \"kube-proxy-4gxdw\" (UID: \"4b745135-7167-4d78-abcf-7976b753b313\") " pod="kube-system/kube-proxy-4gxdw" Jul 16 12:40:18.204802 kubelet[1989]: I0716 12:40:18.204747 1989 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 16 12:40:18.237437 systemd[1]: Created slice kubepods-besteffort-pode917dc23_91d8_4376_9b0f_292ae4754b21.slice. Jul 16 12:40:18.278550 kubelet[1989]: I0716 12:40:18.278480 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e917dc23-91d8-4376-9b0f-292ae4754b21-var-lib-calico\") pod \"tigera-operator-5bf8dfcb4-wr8hx\" (UID: \"e917dc23-91d8-4376-9b0f-292ae4754b21\") " pod="tigera-operator/tigera-operator-5bf8dfcb4-wr8hx" Jul 16 12:40:18.278895 kubelet[1989]: I0716 12:40:18.278851 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f56gr\" (UniqueName: \"kubernetes.io/projected/e917dc23-91d8-4376-9b0f-292ae4754b21-kube-api-access-f56gr\") pod \"tigera-operator-5bf8dfcb4-wr8hx\" (UID: \"e917dc23-91d8-4376-9b0f-292ae4754b21\") " pod="tigera-operator/tigera-operator-5bf8dfcb4-wr8hx" Jul 16 12:40:18.365844 env[1190]: time="2025-07-16T12:40:18.365775982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4gxdw,Uid:4b745135-7167-4d78-abcf-7976b753b313,Namespace:kube-system,Attempt:0,}" Jul 16 12:40:18.397429 env[1190]: time="2025-07-16T12:40:18.397252418Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:18.397806 env[1190]: time="2025-07-16T12:40:18.397718301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:18.398101 env[1190]: time="2025-07-16T12:40:18.398026326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:18.398775 env[1190]: time="2025-07-16T12:40:18.398694177Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/364dc04e2205612b98c77befa4ff11d2a11f27ea88b6b78a1bc03ce50ab936c3 pid=2042 runtime=io.containerd.runc.v2 Jul 16 12:40:18.440104 systemd[1]: Started cri-containerd-364dc04e2205612b98c77befa4ff11d2a11f27ea88b6b78a1bc03ce50ab936c3.scope. Jul 16 12:40:18.480574 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 16 12:40:18.480780 kernel: audit: type=1400 audit(1752669618.473:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.480875 kernel: audit: type=1400 audit(1752669618.473:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.485787 kernel: audit: type=1400 audit(1752669618.473:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.500899 kernel: audit: type=1400 audit(1752669618.473:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.512195 kernel: audit: type=1400 audit(1752669618.473:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.512313 kernel: audit: type=1400 audit(1752669618.473:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.518901 kernel: audit: type=1400 audit(1752669618.473:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.519026 kernel: audit: type=1400 audit(1752669618.473:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.529223 kernel: audit: type=1400 audit(1752669618.473:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.485000 audit: BPF prog-id=103 op=LOAD Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2042 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.538919 kernel: audit: type=1400 audit(1752669618.485:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346463303465323230353631326239386337376265666134666631 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2042 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346463303465323230353631326239386337376265666134666631 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit: BPF prog-id=104 op=LOAD Jul 16 12:40:18.490000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4c70 items=0 ppid=2042 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346463303465323230353631326239386337376265666134666631 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit: BPF prog-id=105 op=LOAD Jul 16 12:40:18.490000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4cb8 items=0 ppid=2042 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346463303465323230353631326239386337376265666134666631 Jul 16 12:40:18.490000 audit: BPF prog-id=105 op=UNLOAD Jul 16 12:40:18.490000 audit: BPF prog-id=104 op=UNLOAD Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { perfmon } for pid=2050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit[2050]: AVC avc: denied { bpf } for pid=2050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.490000 audit: BPF prog-id=106 op=LOAD Jul 16 12:40:18.490000 audit[2050]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d50c8 items=0 ppid=2042 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336346463303465323230353631326239386337376265666134666631 Jul 16 12:40:18.543233 env[1190]: time="2025-07-16T12:40:18.543166932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-5bf8dfcb4-wr8hx,Uid:e917dc23-91d8-4376-9b0f-292ae4754b21,Namespace:tigera-operator,Attempt:0,}" Jul 16 12:40:18.547183 env[1190]: time="2025-07-16T12:40:18.547134555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4gxdw,Uid:4b745135-7167-4d78-abcf-7976b753b313,Namespace:kube-system,Attempt:0,} returns sandbox id \"364dc04e2205612b98c77befa4ff11d2a11f27ea88b6b78a1bc03ce50ab936c3\"" Jul 16 12:40:18.553249 env[1190]: time="2025-07-16T12:40:18.553211343Z" level=info msg="CreateContainer within sandbox \"364dc04e2205612b98c77befa4ff11d2a11f27ea88b6b78a1bc03ce50ab936c3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 16 12:40:18.587089 env[1190]: time="2025-07-16T12:40:18.587031050Z" level=info msg="CreateContainer within sandbox \"364dc04e2205612b98c77befa4ff11d2a11f27ea88b6b78a1bc03ce50ab936c3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3461001deaa14154822174ac22c12c5480395a7f469778aa5aa68a97e396be30\"" Jul 16 12:40:18.588470 env[1190]: time="2025-07-16T12:40:18.588410131Z" level=info msg="StartContainer for \"3461001deaa14154822174ac22c12c5480395a7f469778aa5aa68a97e396be30\"" Jul 16 12:40:18.592621 env[1190]: time="2025-07-16T12:40:18.592465548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:18.592801 env[1190]: time="2025-07-16T12:40:18.592598425Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:18.592801 env[1190]: time="2025-07-16T12:40:18.592652525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:18.593124 env[1190]: time="2025-07-16T12:40:18.593072249Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6dfe8f55ce148b18660d8a8aefbcce09b7e58f27fbab01dcedf5bee984e78f97 pid=2084 runtime=io.containerd.runc.v2 Jul 16 12:40:18.621144 systemd[1]: Started cri-containerd-6dfe8f55ce148b18660d8a8aefbcce09b7e58f27fbab01dcedf5bee984e78f97.scope. Jul 16 12:40:18.639888 systemd[1]: Started cri-containerd-3461001deaa14154822174ac22c12c5480395a7f469778aa5aa68a97e396be30.scope. Jul 16 12:40:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.687000 audit: BPF prog-id=107 op=LOAD Jul 16 12:40:18.688000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.688000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666538663535636531343862313836363064386138616566626363 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666538663535636531343862313836363064386138616566626363 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit: BPF prog-id=108 op=LOAD Jul 16 12:40:18.689000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00037f240 items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666538663535636531343862313836363064386138616566626363 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit: BPF prog-id=109 op=LOAD Jul 16 12:40:18.689000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00037f288 items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666538663535636531343862313836363064386138616566626363 Jul 16 12:40:18.689000 audit: BPF prog-id=109 op=UNLOAD Jul 16 12:40:18.689000 audit: BPF prog-id=108 op=UNLOAD Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.689000 audit: BPF prog-id=110 op=LOAD Jul 16 12:40:18.689000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00037f698 items=0 ppid=2084 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664666538663535636531343862313836363064386138616566626363 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fd489f9b898 items=0 ppid=2042 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363130303164656161313431353438323231373461633232633132 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit: BPF prog-id=111 op=LOAD Jul 16 12:40:18.719000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b0238 items=0 ppid=2042 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363130303164656161313431353438323231373461633232633132 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit: BPF prog-id=112 op=LOAD Jul 16 12:40:18.719000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003b0288 items=0 ppid=2042 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363130303164656161313431353438323231373461633232633132 Jul 16 12:40:18.719000 audit: BPF prog-id=112 op=UNLOAD Jul 16 12:40:18.719000 audit: BPF prog-id=111 op=UNLOAD Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:18.719000 audit: BPF prog-id=113 op=LOAD Jul 16 12:40:18.719000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003b0318 items=0 ppid=2042 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:18.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363130303164656161313431353438323231373461633232633132 Jul 16 12:40:18.762289 env[1190]: time="2025-07-16T12:40:18.762228593Z" level=info msg="StartContainer for \"3461001deaa14154822174ac22c12c5480395a7f469778aa5aa68a97e396be30\" returns successfully" Jul 16 12:40:18.774172 env[1190]: time="2025-07-16T12:40:18.774115747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-5bf8dfcb4-wr8hx,Uid:e917dc23-91d8-4376-9b0f-292ae4754b21,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6dfe8f55ce148b18660d8a8aefbcce09b7e58f27fbab01dcedf5bee984e78f97\"" Jul 16 12:40:18.777639 env[1190]: time="2025-07-16T12:40:18.777596082Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\"" Jul 16 12:40:19.191000 audit[2185]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.191000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd01ffd740 a2=0 a3=7ffd01ffd72c items=0 ppid=2128 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 16 12:40:19.192000 audit[2186]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.192000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe203471a0 a2=0 a3=7ffe2034718c items=0 ppid=2128 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 16 12:40:19.194000 audit[2187]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.194000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc5e0c160 a2=0 a3=7ffcc5e0c14c items=0 ppid=2128 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 16 12:40:19.194000 audit[2188]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.194000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5b1fbac0 a2=0 a3=7fff5b1fbaac items=0 ppid=2128 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 16 12:40:19.195000 audit[2189]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.195000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcba457ad0 a2=0 a3=7ffcba457abc items=0 ppid=2128 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 16 12:40:19.197000 audit[2190]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.197000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff79f8c3c0 a2=0 a3=7fff79f8c3ac items=0 ppid=2128 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 16 12:40:19.224902 systemd[1]: run-containerd-runc-k8s.io-364dc04e2205612b98c77befa4ff11d2a11f27ea88b6b78a1bc03ce50ab936c3-runc.t8eT6N.mount: Deactivated successfully. Jul 16 12:40:19.309000 audit[2191]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.309000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5b7dc530 a2=0 a3=7ffe5b7dc51c items=0 ppid=2128 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 16 12:40:19.315000 audit[2193]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.315000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe4298a7c0 a2=0 a3=7ffe4298a7ac items=0 ppid=2128 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 16 12:40:19.321000 audit[2196]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.321000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7be53740 a2=0 a3=7ffd7be5372c items=0 ppid=2128 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 16 12:40:19.323000 audit[2197]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.323000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7d557170 a2=0 a3=7ffc7d55715c items=0 ppid=2128 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 16 12:40:19.327000 audit[2199]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.327000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc46f1f870 a2=0 a3=7ffc46f1f85c items=0 ppid=2128 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 16 12:40:19.329000 audit[2200]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.329000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff28e1a980 a2=0 a3=7fff28e1a96c items=0 ppid=2128 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 16 12:40:19.333000 audit[2202]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.333000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff9955f4e0 a2=0 a3=7fff9955f4cc items=0 ppid=2128 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 16 12:40:19.339000 audit[2205]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.339000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff714d0840 a2=0 a3=7fff714d082c items=0 ppid=2128 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 16 12:40:19.341000 audit[2206]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.341000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe039309d0 a2=0 a3=7ffe039309bc items=0 ppid=2128 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 16 12:40:19.345000 audit[2208]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.345000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe14981f00 a2=0 a3=7ffe14981eec items=0 ppid=2128 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 16 12:40:19.347000 audit[2209]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.347000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd17c1fa0 a2=0 a3=7fffd17c1f8c items=0 ppid=2128 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 16 12:40:19.352000 audit[2211]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.352000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfe1342e0 a2=0 a3=7ffdfe1342cc items=0 ppid=2128 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 16 12:40:19.358000 audit[2214]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.358000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1e100e50 a2=0 a3=7fff1e100e3c items=0 ppid=2128 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 16 12:40:19.364000 audit[2217]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.364000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe27720470 a2=0 a3=7ffe2772045c items=0 ppid=2128 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 16 12:40:19.366000 audit[2218]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.366000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe3802580 a2=0 a3=7fffe380256c items=0 ppid=2128 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 16 12:40:19.372000 audit[2220]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.372000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffee7386270 a2=0 a3=7ffee738625c items=0 ppid=2128 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:40:19.380000 audit[2223]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.380000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4defbe10 a2=0 a3=7ffe4defbdfc items=0 ppid=2128 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:40:19.382000 audit[2224]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.382000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdbfaddc0 a2=0 a3=7fffdbfaddac items=0 ppid=2128 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 16 12:40:19.385000 audit[2226]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:40:19.385000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe69f12db0 a2=0 a3=7ffe69f12d9c items=0 ppid=2128 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 16 12:40:19.425000 audit[2232]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:19.425000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd570d7ad0 a2=0 a3=7ffd570d7abc items=0 ppid=2128 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:19.437000 audit[2232]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:19.437000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd570d7ad0 a2=0 a3=7ffd570d7abc items=0 ppid=2128 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:19.439000 audit[2237]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.439000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc55db6b80 a2=0 a3=7ffc55db6b6c items=0 ppid=2128 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 16 12:40:19.444000 audit[2239]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.444000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca8904bf0 a2=0 a3=7ffca8904bdc items=0 ppid=2128 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 16 12:40:19.452000 audit[2242]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.452000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfc689880 a2=0 a3=7ffdfc68986c items=0 ppid=2128 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 16 12:40:19.454000 audit[2243]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.454000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe009443c0 a2=0 a3=7ffe009443ac items=0 ppid=2128 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 16 12:40:19.458000 audit[2245]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.458000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2a793550 a2=0 a3=7fff2a79353c items=0 ppid=2128 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 16 12:40:19.460000 audit[2246]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.460000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc9e323e0 a2=0 a3=7ffdc9e323cc items=0 ppid=2128 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 16 12:40:19.464000 audit[2248]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.464000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeebd357c0 a2=0 a3=7ffeebd357ac items=0 ppid=2128 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 16 12:40:19.471000 audit[2251]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.471000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffe1f3ed10 a2=0 a3=7fffe1f3ecfc items=0 ppid=2128 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 16 12:40:19.473000 audit[2252]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.473000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdbe256e0 a2=0 a3=7ffcdbe256cc items=0 ppid=2128 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.473000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 16 12:40:19.478000 audit[2254]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.478000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffede5c3110 a2=0 a3=7ffede5c30fc items=0 ppid=2128 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 16 12:40:19.481000 audit[2255]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.481000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda11e2490 a2=0 a3=7ffda11e247c items=0 ppid=2128 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 16 12:40:19.485000 audit[2257]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.485000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2a53ff20 a2=0 a3=7ffc2a53ff0c items=0 ppid=2128 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 16 12:40:19.495000 audit[2260]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.495000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8c9b98c0 a2=0 a3=7ffd8c9b98ac items=0 ppid=2128 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 16 12:40:19.501000 audit[2263]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.501000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb5573620 a2=0 a3=7ffcb557360c items=0 ppid=2128 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 16 12:40:19.503000 audit[2264]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.503000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff48d63b90 a2=0 a3=7fff48d63b7c items=0 ppid=2128 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 16 12:40:19.506000 audit[2266]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.506000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffecd08430 a2=0 a3=7fffecd0841c items=0 ppid=2128 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:40:19.512000 audit[2269]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.512000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffebe761e40 a2=0 a3=7ffebe761e2c items=0 ppid=2128 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:40:19.513000 audit[2270]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.513000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5a5df460 a2=0 a3=7ffe5a5df44c items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 16 12:40:19.518000 audit[2272]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.518000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffffad37b90 a2=0 a3=7ffffad37b7c items=0 ppid=2128 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 16 12:40:19.520000 audit[2273]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.520000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef6694d70 a2=0 a3=7ffef6694d5c items=0 ppid=2128 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 16 12:40:19.524000 audit[2275]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.524000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee797f190 a2=0 a3=7ffee797f17c items=0 ppid=2128 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:40:19.529000 audit[2278]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:40:19.529000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffddd893c0 a2=0 a3=7fffddd893ac items=0 ppid=2128 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:40:19.534000 audit[2280]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 16 12:40:19.534000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd271c5fe0 a2=0 a3=7ffd271c5fcc items=0 ppid=2128 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.534000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:19.535000 audit[2280]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 16 12:40:19.535000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd271c5fe0 a2=0 a3=7ffd271c5fcc items=0 ppid=2128 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:19.535000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:19.697750 kubelet[1989]: I0716 12:40:19.697535 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-4gxdw" podStartSLOduration=1.697448246 podStartE2EDuration="1.697448246s" podCreationTimestamp="2025-07-16 12:40:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-16 12:40:19.69716167 +0000 UTC m=+7.428669227" watchObservedRunningTime="2025-07-16 12:40:19.697448246 +0000 UTC m=+7.428955789" Jul 16 12:40:20.585059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2236665581.mount: Deactivated successfully. Jul 16 12:40:21.994044 env[1190]: time="2025-07-16T12:40:21.993956915Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:21.996774 env[1190]: time="2025-07-16T12:40:21.996727128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bde16470b09d1963e19456806d73180c9778a6c2b3c1fda2335c67c1cd4ce93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:21.998939 env[1190]: time="2025-07-16T12:40:21.998883792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:22.001823 env[1190]: time="2025-07-16T12:40:22.001779715Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:dbf1bad0def7b5955dc8e4aeee96e23ead0bc5822f6872518e685cd0ed484121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:22.005359 env[1190]: time="2025-07-16T12:40:22.005316768Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\" returns image reference \"sha256:8bde16470b09d1963e19456806d73180c9778a6c2b3c1fda2335c67c1cd4ce93\"" Jul 16 12:40:22.011405 env[1190]: time="2025-07-16T12:40:22.011362976Z" level=info msg="CreateContainer within sandbox \"6dfe8f55ce148b18660d8a8aefbcce09b7e58f27fbab01dcedf5bee984e78f97\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 16 12:40:22.044337 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount38318030.mount: Deactivated successfully. Jul 16 12:40:22.052996 env[1190]: time="2025-07-16T12:40:22.052927491Z" level=info msg="CreateContainer within sandbox \"6dfe8f55ce148b18660d8a8aefbcce09b7e58f27fbab01dcedf5bee984e78f97\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1672b751e8dc6e06f2e5666312778acd1b618899a8a0a3a68ba73f48b3f5ef4b\"" Jul 16 12:40:22.056162 env[1190]: time="2025-07-16T12:40:22.056112193Z" level=info msg="StartContainer for \"1672b751e8dc6e06f2e5666312778acd1b618899a8a0a3a68ba73f48b3f5ef4b\"" Jul 16 12:40:22.086770 systemd[1]: Started cri-containerd-1672b751e8dc6e06f2e5666312778acd1b618899a8a0a3a68ba73f48b3f5ef4b.scope. Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.115000 audit: BPF prog-id=114 op=LOAD Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2084 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:22.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136373262373531653864633665303666326535363636333132373738 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2084 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:22.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136373262373531653864633665303666326535363636333132373738 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit: BPF prog-id=115 op=LOAD Jul 16 12:40:22.116000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000398510 items=0 ppid=2084 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:22.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136373262373531653864633665303666326535363636333132373738 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit: BPF prog-id=116 op=LOAD Jul 16 12:40:22.116000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000398558 items=0 ppid=2084 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:22.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136373262373531653864633665303666326535363636333132373738 Jul 16 12:40:22.116000 audit: BPF prog-id=116 op=UNLOAD Jul 16 12:40:22.116000 audit: BPF prog-id=115 op=UNLOAD Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:22.116000 audit: BPF prog-id=117 op=LOAD Jul 16 12:40:22.116000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000398968 items=0 ppid=2084 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:22.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136373262373531653864633665303666326535363636333132373738 Jul 16 12:40:22.142237 env[1190]: time="2025-07-16T12:40:22.142169376Z" level=info msg="StartContainer for \"1672b751e8dc6e06f2e5666312778acd1b618899a8a0a3a68ba73f48b3f5ef4b\" returns successfully" Jul 16 12:40:22.702954 kubelet[1989]: I0716 12:40:22.702843 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-5bf8dfcb4-wr8hx" podStartSLOduration=1.472182092 podStartE2EDuration="4.7028258s" podCreationTimestamp="2025-07-16 12:40:18 +0000 UTC" firstStartedPulling="2025-07-16 12:40:18.776157789 +0000 UTC m=+6.507665321" lastFinishedPulling="2025-07-16 12:40:22.006801497 +0000 UTC m=+9.738309029" observedRunningTime="2025-07-16 12:40:22.702260295 +0000 UTC m=+10.433767853" watchObservedRunningTime="2025-07-16 12:40:22.7028258 +0000 UTC m=+10.434333344" Jul 16 12:40:29.370454 sudo[1379]: pam_unix(sudo:session): session closed for user root Jul 16 12:40:29.379674 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 16 12:40:29.379878 kernel: audit: type=1106 audit(1752669629.369:926): pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:40:29.369000 audit[1379]: USER_END pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:40:29.370000 audit[1379]: CRED_DISP pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:40:29.387894 kernel: audit: type=1104 audit(1752669629.370:927): pid=1379 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:40:29.534248 sshd[1376]: pam_unix(sshd:session): session closed for user core Jul 16 12:40:29.562035 kernel: audit: type=1106 audit(1752669629.539:928): pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:40:29.539000 audit[1376]: USER_END pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:40:29.566206 systemd[1]: sshd@8-10.230.12.146:22-147.75.109.163:48532.service: Deactivated successfully. Jul 16 12:40:29.569681 systemd[1]: session-9.scope: Deactivated successfully. Jul 16 12:40:29.571253 systemd[1]: session-9.scope: Consumed 7.467s CPU time. Jul 16 12:40:29.574171 systemd-logind[1180]: Session 9 logged out. Waiting for processes to exit. Jul 16 12:40:29.576715 systemd-logind[1180]: Removed session 9. Jul 16 12:40:29.541000 audit[1376]: CRED_DISP pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:40:29.590494 kernel: audit: type=1104 audit(1752669629.541:929): pid=1376 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:40:29.590600 kernel: audit: type=1131 audit(1752669629.567:930): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.12.146:22-147.75.109.163:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:29.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.12.146:22-147.75.109.163:48532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:30.563000 audit[2371]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:30.569034 kernel: audit: type=1325 audit(1752669630.563:931): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:30.563000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeda3a9850 a2=0 a3=7ffeda3a983c items=0 ppid=2128 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:30.578206 kernel: audit: type=1300 audit(1752669630.563:931): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeda3a9850 a2=0 a3=7ffeda3a983c items=0 ppid=2128 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:30.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:30.585945 kernel: audit: type=1327 audit(1752669630.563:931): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:30.568000 audit[2371]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:30.592905 kernel: audit: type=1325 audit(1752669630.568:932): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:30.568000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeda3a9850 a2=0 a3=0 items=0 ppid=2128 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:30.602968 kernel: audit: type=1300 audit(1752669630.568:932): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeda3a9850 a2=0 a3=0 items=0 ppid=2128 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:30.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:30.639000 audit[2373]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:30.639000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffff1775be0 a2=0 a3=7ffff1775bcc items=0 ppid=2128 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:30.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:30.642000 audit[2373]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:30.642000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff1775be0 a2=0 a3=0 items=0 ppid=2128 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:30.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:34.291000 audit[2375]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:34.291000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffff0804120 a2=0 a3=7ffff080410c items=0 ppid=2128 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.291000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:34.305000 audit[2375]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:34.305000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff0804120 a2=0 a3=0 items=0 ppid=2128 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:34.353000 audit[2377]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:34.353000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffebfc93500 a2=0 a3=7ffebfc934ec items=0 ppid=2128 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:34.357000 audit[2377]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:34.357000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffebfc93500 a2=0 a3=0 items=0 ppid=2128 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:34.448240 systemd[1]: Created slice kubepods-besteffort-pod3d28cafe_9d5a_4033_a528_4023ee8779f2.slice. Jul 16 12:40:34.499413 kubelet[1989]: I0716 12:40:34.499317 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3d28cafe-9d5a-4033-a528-4023ee8779f2-typha-certs\") pod \"calico-typha-6444ff778-n8qf2\" (UID: \"3d28cafe-9d5a-4033-a528-4023ee8779f2\") " pod="calico-system/calico-typha-6444ff778-n8qf2" Jul 16 12:40:34.500207 kubelet[1989]: I0716 12:40:34.499419 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvprh\" (UniqueName: \"kubernetes.io/projected/3d28cafe-9d5a-4033-a528-4023ee8779f2-kube-api-access-cvprh\") pod \"calico-typha-6444ff778-n8qf2\" (UID: \"3d28cafe-9d5a-4033-a528-4023ee8779f2\") " pod="calico-system/calico-typha-6444ff778-n8qf2" Jul 16 12:40:34.500207 kubelet[1989]: I0716 12:40:34.499479 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3d28cafe-9d5a-4033-a528-4023ee8779f2-tigera-ca-bundle\") pod \"calico-typha-6444ff778-n8qf2\" (UID: \"3d28cafe-9d5a-4033-a528-4023ee8779f2\") " pod="calico-system/calico-typha-6444ff778-n8qf2" Jul 16 12:40:34.738288 systemd[1]: Created slice kubepods-besteffort-pod838bba74_7d65_458c_a178_d0e01dc0b894.slice. Jul 16 12:40:34.755529 env[1190]: time="2025-07-16T12:40:34.754496180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6444ff778-n8qf2,Uid:3d28cafe-9d5a-4033-a528-4023ee8779f2,Namespace:calico-system,Attempt:0,}" Jul 16 12:40:34.784389 env[1190]: time="2025-07-16T12:40:34.784213144Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:34.784746 env[1190]: time="2025-07-16T12:40:34.784700284Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:34.784996 env[1190]: time="2025-07-16T12:40:34.784931620Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:34.785527 env[1190]: time="2025-07-16T12:40:34.785474989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4efd4652f0f5e58f5a5dc4f03343365b88a5cbc8dad59360af5105726b124402 pid=2388 runtime=io.containerd.runc.v2 Jul 16 12:40:34.803646 kubelet[1989]: I0716 12:40:34.803570 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/838bba74-7d65-458c-a178-d0e01dc0b894-node-certs\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.803906 kubelet[1989]: I0716 12:40:34.803666 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-var-lib-calico\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.803906 kubelet[1989]: I0716 12:40:34.803803 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-xtables-lock\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.804044 kubelet[1989]: I0716 12:40:34.804005 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-cni-log-dir\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.804128 kubelet[1989]: I0716 12:40:34.804084 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-cni-bin-dir\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.804213 kubelet[1989]: I0716 12:40:34.804183 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-flexvol-driver-host\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.804293 kubelet[1989]: I0716 12:40:34.804253 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-lib-modules\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.804375 kubelet[1989]: I0716 12:40:34.804326 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fcp5g\" (UniqueName: \"kubernetes.io/projected/838bba74-7d65-458c-a178-d0e01dc0b894-kube-api-access-fcp5g\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.805770 kubelet[1989]: I0716 12:40:34.804426 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-cni-net-dir\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.805770 kubelet[1989]: I0716 12:40:34.804526 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-policysync\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.805770 kubelet[1989]: I0716 12:40:34.804610 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/838bba74-7d65-458c-a178-d0e01dc0b894-tigera-ca-bundle\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.805770 kubelet[1989]: I0716 12:40:34.804730 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/838bba74-7d65-458c-a178-d0e01dc0b894-var-run-calico\") pod \"calico-node-5lq2k\" (UID: \"838bba74-7d65-458c-a178-d0e01dc0b894\") " pod="calico-system/calico-node-5lq2k" Jul 16 12:40:34.818646 systemd[1]: Started cri-containerd-4efd4652f0f5e58f5a5dc4f03343365b88a5cbc8dad59360af5105726b124402.scope. Jul 16 12:40:34.870940 kernel: kauditd_printk_skb: 19 callbacks suppressed Jul 16 12:40:34.871110 kernel: audit: type=1400 audit(1752669634.862:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.877978 kernel: audit: type=1400 audit(1752669634.862:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.888435 kernel: audit: type=1400 audit(1752669634.862:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.888536 kernel: audit: type=1400 audit(1752669634.862:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.893920 kernel: audit: type=1400 audit(1752669634.862:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.899139 kernel: audit: type=1400 audit(1752669634.862:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.904349 kernel: audit: type=1400 audit(1752669634.862:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.910224 kernel: audit: type=1400 audit(1752669634.862:946): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.920670 kernel: audit: type=1400 audit(1752669634.862:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.920773 kernel: audit: type=1400 audit(1752669634.863:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.863000 audit: BPF prog-id=118 op=LOAD Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2388 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666434363532663066356535386635613564633466303333343333 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2388 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666434363532663066356535386635613564633466303333343333 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit: BPF prog-id=119 op=LOAD Jul 16 12:40:34.871000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0004027d0 items=0 ppid=2388 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666434363532663066356535386635613564633466303333343333 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit: BPF prog-id=120 op=LOAD Jul 16 12:40:34.871000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000402818 items=0 ppid=2388 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666434363532663066356535386635613564633466303333343333 Jul 16 12:40:34.871000 audit: BPF prog-id=120 op=UNLOAD Jul 16 12:40:34.871000 audit: BPF prog-id=119 op=UNLOAD Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:34.871000 audit: BPF prog-id=121 op=LOAD Jul 16 12:40:34.871000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000402c28 items=0 ppid=2388 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:34.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465666434363532663066356535386635613564633466303333343333 Jul 16 12:40:34.933515 kubelet[1989]: E0716 12:40:34.933324 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:34.933515 kubelet[1989]: W0716 12:40:34.933391 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:34.933515 kubelet[1989]: E0716 12:40:34.933452 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:34.955762 kubelet[1989]: E0716 12:40:34.955722 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:34.955762 kubelet[1989]: W0716 12:40:34.955753 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:34.956139 kubelet[1989]: E0716 12:40:34.955781 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:34.980432 env[1190]: time="2025-07-16T12:40:34.980373150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6444ff778-n8qf2,Uid:3d28cafe-9d5a-4033-a528-4023ee8779f2,Namespace:calico-system,Attempt:0,} returns sandbox id \"4efd4652f0f5e58f5a5dc4f03343365b88a5cbc8dad59360af5105726b124402\"" Jul 16 12:40:34.983841 env[1190]: time="2025-07-16T12:40:34.983807684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\"" Jul 16 12:40:35.048139 env[1190]: time="2025-07-16T12:40:35.047762317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5lq2k,Uid:838bba74-7d65-458c-a178-d0e01dc0b894,Namespace:calico-system,Attempt:0,}" Jul 16 12:40:35.083596 env[1190]: time="2025-07-16T12:40:35.083443979Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:40:35.083846 env[1190]: time="2025-07-16T12:40:35.083549136Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:40:35.083846 env[1190]: time="2025-07-16T12:40:35.083590963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:40:35.084422 env[1190]: time="2025-07-16T12:40:35.084346059Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0 pid=2431 runtime=io.containerd.runc.v2 Jul 16 12:40:35.130795 systemd[1]: Started cri-containerd-5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0.scope. Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.180000 audit: BPF prog-id=122 op=LOAD Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633263613436326361623738363234633337623031363434353435 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633263613436326361623738363234633337623031363434353435 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.181000 audit: BPF prog-id=123 op=LOAD Jul 16 12:40:35.181000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000252b40 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633263613436326361623738363234633337623031363434353435 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit: BPF prog-id=124 op=LOAD Jul 16 12:40:35.182000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000252b88 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633263613436326361623738363234633337623031363434353435 Jul 16 12:40:35.182000 audit: BPF prog-id=124 op=UNLOAD Jul 16 12:40:35.182000 audit: BPF prog-id=123 op=UNLOAD Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:35.182000 audit: BPF prog-id=125 op=LOAD Jul 16 12:40:35.182000 audit[2441]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000252f98 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633263613436326361623738363234633337623031363434353435 Jul 16 12:40:35.190904 kubelet[1989]: E0716 12:40:35.190792 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:35.248050 env[1190]: time="2025-07-16T12:40:35.247993133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5lq2k,Uid:838bba74-7d65-458c-a178-d0e01dc0b894,Namespace:calico-system,Attempt:0,} returns sandbox id \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\"" Jul 16 12:40:35.274270 kubelet[1989]: E0716 12:40:35.273976 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.274270 kubelet[1989]: W0716 12:40:35.274002 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.274270 kubelet[1989]: E0716 12:40:35.274057 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.274840 kubelet[1989]: E0716 12:40:35.274652 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.274840 kubelet[1989]: W0716 12:40:35.274671 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.274840 kubelet[1989]: E0716 12:40:35.274689 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.275375 kubelet[1989]: E0716 12:40:35.275190 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.275375 kubelet[1989]: W0716 12:40:35.275209 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.275375 kubelet[1989]: E0716 12:40:35.275226 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.275650 kubelet[1989]: E0716 12:40:35.275627 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.275780 kubelet[1989]: W0716 12:40:35.275755 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.275947 kubelet[1989]: E0716 12:40:35.275910 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.276991 kubelet[1989]: E0716 12:40:35.276967 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.277142 kubelet[1989]: W0716 12:40:35.277116 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.277291 kubelet[1989]: E0716 12:40:35.277267 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.277735 kubelet[1989]: E0716 12:40:35.277712 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.277888 kubelet[1989]: W0716 12:40:35.277844 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.278037 kubelet[1989]: E0716 12:40:35.278011 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.278972 kubelet[1989]: E0716 12:40:35.278949 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.279122 kubelet[1989]: W0716 12:40:35.279095 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.279261 kubelet[1989]: E0716 12:40:35.279235 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.279680 kubelet[1989]: E0716 12:40:35.279653 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.279802 kubelet[1989]: W0716 12:40:35.279774 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.279961 kubelet[1989]: E0716 12:40:35.279935 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.280560 kubelet[1989]: E0716 12:40:35.280538 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.280692 kubelet[1989]: W0716 12:40:35.280666 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.280823 kubelet[1989]: E0716 12:40:35.280798 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.281256 kubelet[1989]: E0716 12:40:35.281235 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.281401 kubelet[1989]: W0716 12:40:35.281375 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.281545 kubelet[1989]: E0716 12:40:35.281519 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.281970 kubelet[1989]: E0716 12:40:35.281948 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.282107 kubelet[1989]: W0716 12:40:35.282082 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.282233 kubelet[1989]: E0716 12:40:35.282210 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.282609 kubelet[1989]: E0716 12:40:35.282575 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.282763 kubelet[1989]: W0716 12:40:35.282727 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.282916 kubelet[1989]: E0716 12:40:35.282863 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.283326 kubelet[1989]: E0716 12:40:35.283283 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.283457 kubelet[1989]: W0716 12:40:35.283432 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.283599 kubelet[1989]: E0716 12:40:35.283570 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.284005 kubelet[1989]: E0716 12:40:35.283983 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.284119 kubelet[1989]: W0716 12:40:35.284094 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.284264 kubelet[1989]: E0716 12:40:35.284228 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.284659 kubelet[1989]: E0716 12:40:35.284637 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.284785 kubelet[1989]: W0716 12:40:35.284761 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.284947 kubelet[1989]: E0716 12:40:35.284920 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.286099 kubelet[1989]: E0716 12:40:35.286076 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.286239 kubelet[1989]: W0716 12:40:35.286213 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.286419 kubelet[1989]: E0716 12:40:35.286393 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.286869 kubelet[1989]: E0716 12:40:35.286834 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.287044 kubelet[1989]: W0716 12:40:35.287018 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.287159 kubelet[1989]: E0716 12:40:35.287134 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.288060 kubelet[1989]: E0716 12:40:35.288037 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.288190 kubelet[1989]: W0716 12:40:35.288165 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.288337 kubelet[1989]: E0716 12:40:35.288298 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.288733 kubelet[1989]: E0716 12:40:35.288711 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.288854 kubelet[1989]: W0716 12:40:35.288829 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.289016 kubelet[1989]: E0716 12:40:35.288991 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.289768 kubelet[1989]: E0716 12:40:35.289745 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.289912 kubelet[1989]: W0716 12:40:35.289885 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.290064 kubelet[1989]: E0716 12:40:35.290039 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.307957 kubelet[1989]: E0716 12:40:35.307833 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.307957 kubelet[1989]: W0716 12:40:35.307925 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.308153 kubelet[1989]: E0716 12:40:35.307961 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.308153 kubelet[1989]: I0716 12:40:35.308004 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c89dbd0e-d645-4beb-a0eb-e54f765fb87a-varrun\") pod \"csi-node-driver-t9nvt\" (UID: \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\") " pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:35.309029 kubelet[1989]: E0716 12:40:35.308999 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.309181 kubelet[1989]: W0716 12:40:35.309155 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.309363 kubelet[1989]: E0716 12:40:35.309314 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.309615 kubelet[1989]: I0716 12:40:35.309590 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c89dbd0e-d645-4beb-a0eb-e54f765fb87a-kubelet-dir\") pod \"csi-node-driver-t9nvt\" (UID: \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\") " pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:35.309973 kubelet[1989]: E0716 12:40:35.309936 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.310097 kubelet[1989]: W0716 12:40:35.310072 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.310217 kubelet[1989]: E0716 12:40:35.310195 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.310616 kubelet[1989]: E0716 12:40:35.310593 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.310761 kubelet[1989]: W0716 12:40:35.310735 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.310905 kubelet[1989]: E0716 12:40:35.310870 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.311175 kubelet[1989]: I0716 12:40:35.311153 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c89dbd0e-d645-4beb-a0eb-e54f765fb87a-registration-dir\") pod \"csi-node-driver-t9nvt\" (UID: \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\") " pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:35.311492 kubelet[1989]: E0716 12:40:35.311471 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.311631 kubelet[1989]: W0716 12:40:35.311606 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.311772 kubelet[1989]: E0716 12:40:35.311748 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.312169 kubelet[1989]: E0716 12:40:35.312138 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.312344 kubelet[1989]: W0716 12:40:35.312296 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.312470 kubelet[1989]: E0716 12:40:35.312445 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.312902 kubelet[1989]: E0716 12:40:35.312863 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.313064 kubelet[1989]: W0716 12:40:35.313038 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.313208 kubelet[1989]: E0716 12:40:35.313185 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.313500 kubelet[1989]: I0716 12:40:35.313474 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-96z27\" (UniqueName: \"kubernetes.io/projected/c89dbd0e-d645-4beb-a0eb-e54f765fb87a-kube-api-access-96z27\") pod \"csi-node-driver-t9nvt\" (UID: \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\") " pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:35.313779 kubelet[1989]: E0716 12:40:35.313758 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.313963 kubelet[1989]: W0716 12:40:35.313939 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.314111 kubelet[1989]: E0716 12:40:35.314088 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.314523 kubelet[1989]: E0716 12:40:35.314500 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.314726 kubelet[1989]: W0716 12:40:35.314700 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.314916 kubelet[1989]: E0716 12:40:35.314857 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.315397 kubelet[1989]: E0716 12:40:35.315374 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.315517 kubelet[1989]: W0716 12:40:35.315493 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.315665 kubelet[1989]: E0716 12:40:35.315641 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.316115 kubelet[1989]: E0716 12:40:35.316083 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.316240 kubelet[1989]: W0716 12:40:35.316218 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.316398 kubelet[1989]: E0716 12:40:35.316373 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.316838 kubelet[1989]: E0716 12:40:35.316810 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.317015 kubelet[1989]: W0716 12:40:35.316992 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.317149 kubelet[1989]: E0716 12:40:35.317111 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.317431 kubelet[1989]: I0716 12:40:35.317405 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c89dbd0e-d645-4beb-a0eb-e54f765fb87a-socket-dir\") pod \"csi-node-driver-t9nvt\" (UID: \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\") " pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:35.317630 kubelet[1989]: E0716 12:40:35.317609 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.317765 kubelet[1989]: W0716 12:40:35.317740 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.317941 kubelet[1989]: E0716 12:40:35.317916 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.318376 kubelet[1989]: E0716 12:40:35.318354 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.318514 kubelet[1989]: W0716 12:40:35.318489 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.318637 kubelet[1989]: E0716 12:40:35.318612 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.319019 kubelet[1989]: E0716 12:40:35.318999 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.319163 kubelet[1989]: W0716 12:40:35.319139 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.319274 kubelet[1989]: E0716 12:40:35.319250 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.397000 audit[2499]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:35.397000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe1e8278e0 a2=0 a3=7ffe1e8278cc items=0 ppid=2128 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:35.405000 audit[2499]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:35.405000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe1e8278e0 a2=0 a3=0 items=0 ppid=2128 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:35.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:35.419046 kubelet[1989]: E0716 12:40:35.419010 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.419222 kubelet[1989]: W0716 12:40:35.419192 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.419404 kubelet[1989]: E0716 12:40:35.419376 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.419907 kubelet[1989]: E0716 12:40:35.419851 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.420070 kubelet[1989]: W0716 12:40:35.420044 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.420204 kubelet[1989]: E0716 12:40:35.420179 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.420670 kubelet[1989]: E0716 12:40:35.420636 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.420827 kubelet[1989]: W0716 12:40:35.420804 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.421007 kubelet[1989]: E0716 12:40:35.420983 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.421372 kubelet[1989]: E0716 12:40:35.421349 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.421513 kubelet[1989]: W0716 12:40:35.421488 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.421645 kubelet[1989]: E0716 12:40:35.421620 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.422133 kubelet[1989]: E0716 12:40:35.422110 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.422252 kubelet[1989]: W0716 12:40:35.422227 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.422528 kubelet[1989]: E0716 12:40:35.422504 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.422795 kubelet[1989]: E0716 12:40:35.422681 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.422969 kubelet[1989]: W0716 12:40:35.422942 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.423392 kubelet[1989]: E0716 12:40:35.423368 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.423608 kubelet[1989]: E0716 12:40:35.423543 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.423782 kubelet[1989]: W0716 12:40:35.423745 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.423962 kubelet[1989]: E0716 12:40:35.423938 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.424424 kubelet[1989]: E0716 12:40:35.424402 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.424560 kubelet[1989]: W0716 12:40:35.424535 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.424698 kubelet[1989]: E0716 12:40:35.424676 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.425125 kubelet[1989]: E0716 12:40:35.425104 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.425272 kubelet[1989]: W0716 12:40:35.425247 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.425411 kubelet[1989]: E0716 12:40:35.425384 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.425853 kubelet[1989]: E0716 12:40:35.425831 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.426034 kubelet[1989]: W0716 12:40:35.426009 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.426257 kubelet[1989]: E0716 12:40:35.426232 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.426807 kubelet[1989]: E0716 12:40:35.426785 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.426960 kubelet[1989]: W0716 12:40:35.426935 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.427223 kubelet[1989]: E0716 12:40:35.427199 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.427442 kubelet[1989]: E0716 12:40:35.427421 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.427632 kubelet[1989]: W0716 12:40:35.427606 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.428020 kubelet[1989]: E0716 12:40:35.427996 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.428222 kubelet[1989]: E0716 12:40:35.428201 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.428366 kubelet[1989]: W0716 12:40:35.428340 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.428616 kubelet[1989]: E0716 12:40:35.428593 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.428896 kubelet[1989]: E0716 12:40:35.428840 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.429038 kubelet[1989]: W0716 12:40:35.429014 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.429291 kubelet[1989]: E0716 12:40:35.429268 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.429519 kubelet[1989]: E0716 12:40:35.429499 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.429650 kubelet[1989]: W0716 12:40:35.429627 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.429922 kubelet[1989]: E0716 12:40:35.429869 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.430145 kubelet[1989]: E0716 12:40:35.430124 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.430278 kubelet[1989]: W0716 12:40:35.430253 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.430540 kubelet[1989]: E0716 12:40:35.430516 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.430760 kubelet[1989]: E0716 12:40:35.430741 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.430897 kubelet[1989]: W0716 12:40:35.430858 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.431170 kubelet[1989]: E0716 12:40:35.431136 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.431380 kubelet[1989]: E0716 12:40:35.431359 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.431504 kubelet[1989]: W0716 12:40:35.431480 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.431768 kubelet[1989]: E0716 12:40:35.431746 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.432032 kubelet[1989]: E0716 12:40:35.432012 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.432191 kubelet[1989]: W0716 12:40:35.432155 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.432434 kubelet[1989]: E0716 12:40:35.432412 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.432975 kubelet[1989]: E0716 12:40:35.432952 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.433102 kubelet[1989]: W0716 12:40:35.433077 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.433270 kubelet[1989]: E0716 12:40:35.433247 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.433723 kubelet[1989]: E0716 12:40:35.433701 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.433854 kubelet[1989]: W0716 12:40:35.433829 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.434108 kubelet[1989]: E0716 12:40:35.434085 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.435277 kubelet[1989]: E0716 12:40:35.435252 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.435425 kubelet[1989]: W0716 12:40:35.435399 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.435642 kubelet[1989]: E0716 12:40:35.435618 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.436416 kubelet[1989]: E0716 12:40:35.436393 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.436603 kubelet[1989]: W0716 12:40:35.436577 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.437046 kubelet[1989]: E0716 12:40:35.437022 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.437271 kubelet[1989]: E0716 12:40:35.437250 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.437402 kubelet[1989]: W0716 12:40:35.437377 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.437672 kubelet[1989]: E0716 12:40:35.437648 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.437894 kubelet[1989]: E0716 12:40:35.437859 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.438013 kubelet[1989]: W0716 12:40:35.437988 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.438127 kubelet[1989]: E0716 12:40:35.438103 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:35.455038 kubelet[1989]: E0716 12:40:35.455008 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:35.455211 kubelet[1989]: W0716 12:40:35.455183 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:35.455349 kubelet[1989]: E0716 12:40:35.455310 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:36.605681 kubelet[1989]: E0716 12:40:36.605576 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:36.698428 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2987852750.mount: Deactivated successfully. Jul 16 12:40:38.605813 kubelet[1989]: E0716 12:40:38.605693 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:38.720537 env[1190]: time="2025-07-16T12:40:38.720411700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:38.723000 env[1190]: time="2025-07-16T12:40:38.722956287Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b3baa600c7ff9cd50dc12f2529ef263aaa346dbeca13c77c6553d661fd216b54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:38.725333 env[1190]: time="2025-07-16T12:40:38.725287506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:38.727383 env[1190]: time="2025-07-16T12:40:38.727342805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:da29d745efe5eb7d25f765d3aa439f3fe60710a458efe39c285e58b02bd961af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:38.728494 env[1190]: time="2025-07-16T12:40:38.728428700Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\" returns image reference \"sha256:b3baa600c7ff9cd50dc12f2529ef263aaa346dbeca13c77c6553d661fd216b54\"" Jul 16 12:40:38.735751 env[1190]: time="2025-07-16T12:40:38.735691928Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 16 12:40:38.759773 env[1190]: time="2025-07-16T12:40:38.759722418Z" level=info msg="CreateContainer within sandbox \"4efd4652f0f5e58f5a5dc4f03343365b88a5cbc8dad59360af5105726b124402\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 16 12:40:38.776410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3382522845.mount: Deactivated successfully. Jul 16 12:40:38.783503 env[1190]: time="2025-07-16T12:40:38.783457945Z" level=info msg="CreateContainer within sandbox \"4efd4652f0f5e58f5a5dc4f03343365b88a5cbc8dad59360af5105726b124402\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"457ad40574fd95b25fdf8c66988eacc0ccdc4286917dd15900afea38c4093dea\"" Jul 16 12:40:38.785885 env[1190]: time="2025-07-16T12:40:38.785822423Z" level=info msg="StartContainer for \"457ad40574fd95b25fdf8c66988eacc0ccdc4286917dd15900afea38c4093dea\"" Jul 16 12:40:38.832585 systemd[1]: Started cri-containerd-457ad40574fd95b25fdf8c66988eacc0ccdc4286917dd15900afea38c4093dea.scope. Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.879000 audit: BPF prog-id=126 op=LOAD Jul 16 12:40:38.880000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.880000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2388 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:38.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376164343035373466643935623235666466386336363938386561 Jul 16 12:40:38.881000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.881000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2388 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:38.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376164343035373466643935623235666466386336363938386561 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.882000 audit: BPF prog-id=127 op=LOAD Jul 16 12:40:38.882000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018bf00 items=0 ppid=2388 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:38.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376164343035373466643935623235666466386336363938386561 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.883000 audit: BPF prog-id=128 op=LOAD Jul 16 12:40:38.883000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018bf48 items=0 ppid=2388 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:38.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376164343035373466643935623235666466386336363938386561 Jul 16 12:40:38.884000 audit: BPF prog-id=128 op=UNLOAD Jul 16 12:40:38.885000 audit: BPF prog-id=127 op=UNLOAD Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:38.885000 audit: BPF prog-id=129 op=LOAD Jul 16 12:40:38.885000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2358 items=0 ppid=2388 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:38.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435376164343035373466643935623235666466386336363938386561 Jul 16 12:40:38.944032 env[1190]: time="2025-07-16T12:40:38.943952686Z" level=info msg="StartContainer for \"457ad40574fd95b25fdf8c66988eacc0ccdc4286917dd15900afea38c4093dea\" returns successfully" Jul 16 12:40:39.774044 kubelet[1989]: I0716 12:40:39.773942 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6444ff778-n8qf2" podStartSLOduration=2.025192705 podStartE2EDuration="5.773909742s" podCreationTimestamp="2025-07-16 12:40:34 +0000 UTC" firstStartedPulling="2025-07-16 12:40:34.982338855 +0000 UTC m=+22.713846385" lastFinishedPulling="2025-07-16 12:40:38.731055878 +0000 UTC m=+26.462563422" observedRunningTime="2025-07-16 12:40:39.772375158 +0000 UTC m=+27.503882728" watchObservedRunningTime="2025-07-16 12:40:39.773909742 +0000 UTC m=+27.505417275" Jul 16 12:40:39.822094 kubelet[1989]: E0716 12:40:39.822039 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.822094 kubelet[1989]: W0716 12:40:39.822091 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.822373 kubelet[1989]: E0716 12:40:39.822150 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.822556 kubelet[1989]: E0716 12:40:39.822534 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.822556 kubelet[1989]: W0716 12:40:39.822555 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.822724 kubelet[1989]: E0716 12:40:39.822572 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.822835 kubelet[1989]: E0716 12:40:39.822810 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.822835 kubelet[1989]: W0716 12:40:39.822831 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.823008 kubelet[1989]: E0716 12:40:39.822848 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.823158 kubelet[1989]: E0716 12:40:39.823126 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.823158 kubelet[1989]: W0716 12:40:39.823154 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.823326 kubelet[1989]: E0716 12:40:39.823170 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.823457 kubelet[1989]: E0716 12:40:39.823435 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.823457 kubelet[1989]: W0716 12:40:39.823458 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.823617 kubelet[1989]: E0716 12:40:39.823475 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.823725 kubelet[1989]: E0716 12:40:39.823701 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.823725 kubelet[1989]: W0716 12:40:39.823722 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.823918 kubelet[1989]: E0716 12:40:39.823738 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.824014 kubelet[1989]: E0716 12:40:39.823988 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.824014 kubelet[1989]: W0716 12:40:39.824010 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.824175 kubelet[1989]: E0716 12:40:39.824025 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.824308 kubelet[1989]: E0716 12:40:39.824284 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.824308 kubelet[1989]: W0716 12:40:39.824304 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.824470 kubelet[1989]: E0716 12:40:39.824320 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.824591 kubelet[1989]: E0716 12:40:39.824567 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.824591 kubelet[1989]: W0716 12:40:39.824588 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.824750 kubelet[1989]: E0716 12:40:39.824603 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.824893 kubelet[1989]: E0716 12:40:39.824853 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.824893 kubelet[1989]: W0716 12:40:39.824887 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.825064 kubelet[1989]: E0716 12:40:39.824904 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.825155 kubelet[1989]: E0716 12:40:39.825131 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.825155 kubelet[1989]: W0716 12:40:39.825152 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.825296 kubelet[1989]: E0716 12:40:39.825171 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.825438 kubelet[1989]: E0716 12:40:39.825416 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.825438 kubelet[1989]: W0716 12:40:39.825436 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.825606 kubelet[1989]: E0716 12:40:39.825452 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.825712 kubelet[1989]: E0716 12:40:39.825686 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.825712 kubelet[1989]: W0716 12:40:39.825707 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.825921 kubelet[1989]: E0716 12:40:39.825724 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.826030 kubelet[1989]: E0716 12:40:39.826006 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.826132 kubelet[1989]: W0716 12:40:39.826036 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.826132 kubelet[1989]: E0716 12:40:39.826052 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.826319 kubelet[1989]: E0716 12:40:39.826297 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.826319 kubelet[1989]: W0716 12:40:39.826316 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.826502 kubelet[1989]: E0716 12:40:39.826332 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.875707 kubelet[1989]: E0716 12:40:39.875640 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.875707 kubelet[1989]: W0716 12:40:39.875682 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.876033 kubelet[1989]: E0716 12:40:39.875727 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.876346 kubelet[1989]: E0716 12:40:39.876318 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.876346 kubelet[1989]: W0716 12:40:39.876342 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.876506 kubelet[1989]: E0716 12:40:39.876367 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.876778 kubelet[1989]: E0716 12:40:39.876729 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.876778 kubelet[1989]: W0716 12:40:39.876763 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.876961 kubelet[1989]: E0716 12:40:39.876790 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.877185 kubelet[1989]: E0716 12:40:39.877151 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.877185 kubelet[1989]: W0716 12:40:39.877184 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.877355 kubelet[1989]: E0716 12:40:39.877330 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.877609 kubelet[1989]: E0716 12:40:39.877575 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.877609 kubelet[1989]: W0716 12:40:39.877607 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.877775 kubelet[1989]: E0716 12:40:39.877731 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.878056 kubelet[1989]: E0716 12:40:39.878010 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.878056 kubelet[1989]: W0716 12:40:39.878053 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.878245 kubelet[1989]: E0716 12:40:39.878210 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.878456 kubelet[1989]: E0716 12:40:39.878431 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.878456 kubelet[1989]: W0716 12:40:39.878452 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.878662 kubelet[1989]: E0716 12:40:39.878475 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.878815 kubelet[1989]: E0716 12:40:39.878781 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.878815 kubelet[1989]: W0716 12:40:39.878815 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.879015 kubelet[1989]: E0716 12:40:39.878839 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.879365 kubelet[1989]: E0716 12:40:39.879328 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.879365 kubelet[1989]: W0716 12:40:39.879361 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.879610 kubelet[1989]: E0716 12:40:39.879573 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.879797 kubelet[1989]: E0716 12:40:39.879664 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.879797 kubelet[1989]: W0716 12:40:39.879788 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.880148 kubelet[1989]: E0716 12:40:39.880121 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.880148 kubelet[1989]: W0716 12:40:39.880141 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.880328 kubelet[1989]: E0716 12:40:39.880156 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.880483 kubelet[1989]: E0716 12:40:39.880439 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.880483 kubelet[1989]: W0716 12:40:39.880460 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.880721 kubelet[1989]: E0716 12:40:39.880489 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.880922 kubelet[1989]: E0716 12:40:39.880894 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.880922 kubelet[1989]: W0716 12:40:39.880917 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.881114 kubelet[1989]: E0716 12:40:39.880945 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.881255 kubelet[1989]: E0716 12:40:39.881216 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.881655 kubelet[1989]: E0716 12:40:39.881632 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.881786 kubelet[1989]: W0716 12:40:39.881748 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.881953 kubelet[1989]: E0716 12:40:39.881928 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.882358 kubelet[1989]: E0716 12:40:39.882321 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.882358 kubelet[1989]: W0716 12:40:39.882354 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.882514 kubelet[1989]: E0716 12:40:39.882379 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.882812 kubelet[1989]: E0716 12:40:39.882787 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.882812 kubelet[1989]: W0716 12:40:39.882809 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.882965 kubelet[1989]: E0716 12:40:39.882835 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.883521 kubelet[1989]: E0716 12:40:39.883494 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.883521 kubelet[1989]: W0716 12:40:39.883517 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.883737 kubelet[1989]: E0716 12:40:39.883708 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:39.886096 kubelet[1989]: E0716 12:40:39.886071 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:39.886290 kubelet[1989]: W0716 12:40:39.886263 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:39.886436 kubelet[1989]: E0716 12:40:39.886409 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.604622 kubelet[1989]: E0716 12:40:40.603366 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:40.743203 env[1190]: time="2025-07-16T12:40:40.743122939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:40.744746 env[1190]: time="2025-07-16T12:40:40.744711171Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:40.746644 env[1190]: time="2025-07-16T12:40:40.746604425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:40.748452 env[1190]: time="2025-07-16T12:40:40.748413775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:40.749559 env[1190]: time="2025-07-16T12:40:40.749520019Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 16 12:40:40.756775 kubelet[1989]: I0716 12:40:40.756311 1989 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 16 12:40:40.758932 env[1190]: time="2025-07-16T12:40:40.758869255Z" level=info msg="CreateContainer within sandbox \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 16 12:40:40.775736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3796696933.mount: Deactivated successfully. Jul 16 12:40:40.783781 env[1190]: time="2025-07-16T12:40:40.783647205Z" level=info msg="CreateContainer within sandbox \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485\"" Jul 16 12:40:40.784421 env[1190]: time="2025-07-16T12:40:40.784386459Z" level=info msg="StartContainer for \"d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485\"" Jul 16 12:40:40.825050 systemd[1]: Started cri-containerd-d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485.scope. Jul 16 12:40:40.840221 kubelet[1989]: E0716 12:40:40.838843 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.840221 kubelet[1989]: W0716 12:40:40.838928 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.840221 kubelet[1989]: E0716 12:40:40.838961 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.840221 kubelet[1989]: E0716 12:40:40.839312 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.840221 kubelet[1989]: W0716 12:40:40.839328 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.840221 kubelet[1989]: E0716 12:40:40.839344 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.840221 kubelet[1989]: E0716 12:40:40.839655 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.840221 kubelet[1989]: W0716 12:40:40.839684 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.840221 kubelet[1989]: E0716 12:40:40.839717 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.836537 systemd[1]: run-containerd-runc-k8s.io-d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485-runc.HMLAth.mount: Deactivated successfully. Jul 16 12:40:40.842465 kubelet[1989]: E0716 12:40:40.841185 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.842465 kubelet[1989]: W0716 12:40:40.841213 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.842465 kubelet[1989]: E0716 12:40:40.841233 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.842465 kubelet[1989]: E0716 12:40:40.841589 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.842465 kubelet[1989]: W0716 12:40:40.841605 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.842465 kubelet[1989]: E0716 12:40:40.841621 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.842465 kubelet[1989]: E0716 12:40:40.841938 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.842465 kubelet[1989]: W0716 12:40:40.841952 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.842465 kubelet[1989]: E0716 12:40:40.841966 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.844481 kubelet[1989]: E0716 12:40:40.843722 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.844481 kubelet[1989]: W0716 12:40:40.843739 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.844481 kubelet[1989]: E0716 12:40:40.843756 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.844481 kubelet[1989]: E0716 12:40:40.844090 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.844481 kubelet[1989]: W0716 12:40:40.844105 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.844481 kubelet[1989]: E0716 12:40:40.844121 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.845411 kubelet[1989]: E0716 12:40:40.844942 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.845411 kubelet[1989]: W0716 12:40:40.844960 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.845411 kubelet[1989]: E0716 12:40:40.844989 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.845411 kubelet[1989]: E0716 12:40:40.845286 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.845411 kubelet[1989]: W0716 12:40:40.845301 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.845411 kubelet[1989]: E0716 12:40:40.845317 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.846152 kubelet[1989]: E0716 12:40:40.846015 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.846152 kubelet[1989]: W0716 12:40:40.846033 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.846152 kubelet[1989]: E0716 12:40:40.846049 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.846615 kubelet[1989]: E0716 12:40:40.846594 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.846996 kubelet[1989]: W0716 12:40:40.846742 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.846996 kubelet[1989]: E0716 12:40:40.846832 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.847378 kubelet[1989]: E0716 12:40:40.847357 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.847521 kubelet[1989]: W0716 12:40:40.847496 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.847701 kubelet[1989]: E0716 12:40:40.847665 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.849765 kubelet[1989]: E0716 12:40:40.849742 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.849976 kubelet[1989]: W0716 12:40:40.849937 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.850131 kubelet[1989]: E0716 12:40:40.850106 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.850623 kubelet[1989]: E0716 12:40:40.850601 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.850774 kubelet[1989]: W0716 12:40:40.850750 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.850984 kubelet[1989]: E0716 12:40:40.850959 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.885606 kubelet[1989]: E0716 12:40:40.885523 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.886138 kubelet[1989]: W0716 12:40:40.886110 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.886349 kubelet[1989]: E0716 12:40:40.886321 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.888099 kubelet[1989]: E0716 12:40:40.888053 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.888315 kubelet[1989]: W0716 12:40:40.888292 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.888518 kubelet[1989]: E0716 12:40:40.888484 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.890153 kubelet[1989]: E0716 12:40:40.890130 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.890332 kubelet[1989]: W0716 12:40:40.890305 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.891305 kubelet[1989]: E0716 12:40:40.891280 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.891680 kubelet[1989]: E0716 12:40:40.891564 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.891861 kubelet[1989]: W0716 12:40:40.891824 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.892119 kubelet[1989]: E0716 12:40:40.892093 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.892985 kubelet[1989]: E0716 12:40:40.892933 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.893253 kubelet[1989]: W0716 12:40:40.893203 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.893522 kubelet[1989]: E0716 12:40:40.893494 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.894187 kubelet[1989]: E0716 12:40:40.894153 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.894431 kubelet[1989]: W0716 12:40:40.894370 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.894711 kubelet[1989]: E0716 12:40:40.894686 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.895442 kubelet[1989]: E0716 12:40:40.895420 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.894000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.895991 kubelet[1989]: W0716 12:40:40.895917 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.896298 kubelet[1989]: E0716 12:40:40.896273 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.896752 kubelet[1989]: E0716 12:40:40.896730 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.896887 kubelet[1989]: W0716 12:40:40.896850 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.897067 kernel: kauditd_printk_skb: 167 callbacks suppressed Jul 16 12:40:40.897232 kernel: audit: type=1400 audit(1752669640.894:995): avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.897555 kubelet[1989]: E0716 12:40:40.897531 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.897930 kubelet[1989]: E0716 12:40:40.897908 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.898058 kubelet[1989]: W0716 12:40:40.898033 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.898717 kubelet[1989]: E0716 12:40:40.898693 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.899113 kubelet[1989]: E0716 12:40:40.899091 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.899270 kubelet[1989]: W0716 12:40:40.899244 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.899536 kubelet[1989]: E0716 12:40:40.899512 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.899852 kubelet[1989]: E0716 12:40:40.899831 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.899982 kubelet[1989]: W0716 12:40:40.899957 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.900260 kubelet[1989]: E0716 12:40:40.900236 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.900590 kubelet[1989]: E0716 12:40:40.900568 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.900722 kubelet[1989]: W0716 12:40:40.900697 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.901026 kubelet[1989]: E0716 12:40:40.901004 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.901358 kubelet[1989]: E0716 12:40:40.901337 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.901475 kubelet[1989]: W0716 12:40:40.901451 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.901728 kubelet[1989]: E0716 12:40:40.901704 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.902448 kubelet[1989]: E0716 12:40:40.902426 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.902578 kubelet[1989]: W0716 12:40:40.902542 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.902918 kubelet[1989]: E0716 12:40:40.902855 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.903987 kubelet[1989]: E0716 12:40:40.903966 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.904703 kubelet[1989]: W0716 12:40:40.904676 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.904919 kubelet[1989]: E0716 12:40:40.904895 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.906135 kubelet[1989]: E0716 12:40:40.906114 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.894000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f17c854bc38 items=0 ppid=2431 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:40.906499 kubelet[1989]: W0716 12:40:40.906473 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.906753 kubelet[1989]: E0716 12:40:40.906729 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.907134 kubelet[1989]: E0716 12:40:40.907112 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.907649 kubelet[1989]: W0716 12:40:40.907324 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.907649 kubelet[1989]: E0716 12:40:40.907444 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.907902 kubelet[1989]: E0716 12:40:40.907880 1989 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:40:40.908044 kubelet[1989]: W0716 12:40:40.908019 1989 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:40:40.908196 kubelet[1989]: E0716 12:40:40.908146 1989 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:40:40.914918 kernel: audit: type=1300 audit(1752669640.894:995): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f17c854bc38 items=0 ppid=2431 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:40.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653134616566333036336665616133353535316537366330663464 Jul 16 12:40:40.922921 kernel: audit: type=1327 audit(1752669640.894:995): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653134616566333036336665616133353535316537366330663464 Jul 16 12:40:40.929443 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.937063 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.947325 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.963079 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.963164 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.968718 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit: BPF prog-id=130 op=LOAD Jul 16 12:40:40.901000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000287148 items=0 ppid=2431 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:40.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653134616566333036336665616133353535316537366330663464 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.974954 kernel: audit: type=1400 audit(1752669640.901:996): avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit: BPF prog-id=131 op=LOAD Jul 16 12:40:40.901000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000287198 items=0 ppid=2431 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:40.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653134616566333036336665616133353535316537366330663464 Jul 16 12:40:40.901000 audit: BPF prog-id=131 op=UNLOAD Jul 16 12:40:40.901000 audit: BPF prog-id=130 op=UNLOAD Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:40.901000 audit: BPF prog-id=132 op=LOAD Jul 16 12:40:40.901000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000287228 items=0 ppid=2431 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:40.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653134616566333036336665616133353535316537366330663464 Jul 16 12:40:40.983737 env[1190]: time="2025-07-16T12:40:40.983673840Z" level=info msg="StartContainer for \"d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485\" returns successfully" Jul 16 12:40:41.013557 systemd[1]: cri-containerd-d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485.scope: Deactivated successfully. Jul 16 12:40:41.017000 audit: BPF prog-id=132 op=UNLOAD Jul 16 12:40:41.091882 env[1190]: time="2025-07-16T12:40:41.091799473Z" level=info msg="shim disconnected" id=d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485 Jul 16 12:40:41.092163 env[1190]: time="2025-07-16T12:40:41.091892878Z" level=warning msg="cleaning up after shim disconnected" id=d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485 namespace=k8s.io Jul 16 12:40:41.092163 env[1190]: time="2025-07-16T12:40:41.091913789Z" level=info msg="cleaning up dead shim" Jul 16 12:40:41.105436 env[1190]: time="2025-07-16T12:40:41.105383179Z" level=warning msg="cleanup warnings time=\"2025-07-16T12:40:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2677 runtime=io.containerd.runc.v2\n" Jul 16 12:40:41.761885 env[1190]: time="2025-07-16T12:40:41.761822124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 16 12:40:41.772044 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d3e14aef3063feaa35551e76c0f4d7cad4d727c4e670680b4c794cb95429e485-rootfs.mount: Deactivated successfully. Jul 16 12:40:42.064779 kubelet[1989]: I0716 12:40:42.064340 1989 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 16 12:40:42.111000 audit[2694]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:42.111000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcecff6ea0 a2=0 a3=7ffcecff6e8c items=0 ppid=2128 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:42.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:42.117000 audit[2694]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:40:42.117000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcecff6ea0 a2=0 a3=7ffcecff6e8c items=0 ppid=2128 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:42.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:40:42.603349 kubelet[1989]: E0716 12:40:42.603297 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:44.603450 kubelet[1989]: E0716 12:40:44.602990 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:46.605903 kubelet[1989]: E0716 12:40:46.605793 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:47.775502 env[1190]: time="2025-07-16T12:40:47.775425899Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:47.780833 env[1190]: time="2025-07-16T12:40:47.780797682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:47.783966 env[1190]: time="2025-07-16T12:40:47.783928274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:47.786843 env[1190]: time="2025-07-16T12:40:47.786807832Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:40:47.788027 env[1190]: time="2025-07-16T12:40:47.787978490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 16 12:40:47.792260 env[1190]: time="2025-07-16T12:40:47.792219508Z" level=info msg="CreateContainer within sandbox \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 16 12:40:47.811062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2202184718.mount: Deactivated successfully. Jul 16 12:40:47.820047 env[1190]: time="2025-07-16T12:40:47.819995929Z" level=info msg="CreateContainer within sandbox \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce\"" Jul 16 12:40:47.821424 env[1190]: time="2025-07-16T12:40:47.821363314Z" level=info msg="StartContainer for \"da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce\"" Jul 16 12:40:47.866095 systemd[1]: Started cri-containerd-da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce.scope. Jul 16 12:40:47.912000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.916630 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 16 12:40:47.916847 kernel: audit: type=1400 audit(1752669647.912:1004): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.912000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3800114758 items=0 ppid=2431 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:47.930082 kernel: audit: type=1300 audit(1752669647.912:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3800114758 items=0 ppid=2431 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:47.930175 kernel: audit: type=1327 audit(1752669647.912:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373035646461636130313465383131656462396664363030646463 Jul 16 12:40:47.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373035646461636130313465383131656462396664363030646463 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.942175 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.952979 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.953148 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.958469 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.964057 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.969473 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.970935 kernel: audit: type=1400 audit(1752669647.915:1005): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.915000 audit: BPF prog-id=133 op=LOAD Jul 16 12:40:47.915000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d1ba8 items=0 ppid=2431 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:47.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373035646461636130313465383131656462396664363030646463 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.920000 audit: BPF prog-id=134 op=LOAD Jul 16 12:40:47.920000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d1bf8 items=0 ppid=2431 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:47.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373035646461636130313465383131656462396664363030646463 Jul 16 12:40:47.920000 audit: BPF prog-id=134 op=UNLOAD Jul 16 12:40:47.921000 audit: BPF prog-id=133 op=UNLOAD Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:40:47.921000 audit: BPF prog-id=135 op=LOAD Jul 16 12:40:47.921000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d1c88 items=0 ppid=2431 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:47.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373035646461636130313465383131656462396664363030646463 Jul 16 12:40:47.986583 env[1190]: time="2025-07-16T12:40:47.986479294Z" level=info msg="StartContainer for \"da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce\" returns successfully" Jul 16 12:40:48.606352 kubelet[1989]: E0716 12:40:48.606287 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:48.805029 systemd[1]: run-containerd-runc-k8s.io-da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce-runc.SpiSg9.mount: Deactivated successfully. Jul 16 12:40:49.340348 env[1190]: time="2025-07-16T12:40:49.340183660Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 16 12:40:49.344282 systemd[1]: cri-containerd-da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce.scope: Deactivated successfully. Jul 16 12:40:49.346000 audit: BPF prog-id=135 op=UNLOAD Jul 16 12:40:49.377543 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce-rootfs.mount: Deactivated successfully. Jul 16 12:40:49.382756 env[1190]: time="2025-07-16T12:40:49.382699363Z" level=info msg="shim disconnected" id=da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce Jul 16 12:40:49.382964 env[1190]: time="2025-07-16T12:40:49.382768472Z" level=warning msg="cleaning up after shim disconnected" id=da705ddaca014e811edb9fd600ddca50bb5d347719ee1baff8bc1470d0d87cce namespace=k8s.io Jul 16 12:40:49.382964 env[1190]: time="2025-07-16T12:40:49.382789673Z" level=info msg="cleaning up dead shim" Jul 16 12:40:49.396630 kubelet[1989]: I0716 12:40:49.396240 1989 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Jul 16 12:40:49.406786 env[1190]: time="2025-07-16T12:40:49.406730857Z" level=warning msg="cleanup warnings time=\"2025-07-16T12:40:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2748 runtime=io.containerd.runc.v2\n" Jul 16 12:40:49.465991 systemd[1]: Created slice kubepods-burstable-podf377f6d0_6e59_4b6f_943d_6b38f4839100.slice. Jul 16 12:40:49.488794 kubelet[1989]: W0716 12:40:49.488726 1989 reflector.go:561] object-"calico-system"/"goldmane-ca-bundle": failed to list *v1.ConfigMap: configmaps "goldmane-ca-bundle" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.489325 kubelet[1989]: W0716 12:40:49.489296 1989 reflector.go:561] object-"calico-system"/"whisker-ca-bundle": failed to list *v1.ConfigMap: configmaps "whisker-ca-bundle" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.492160 systemd[1]: Created slice kubepods-besteffort-podab651272_d47f_4948_b667_dab25752f7ab.slice. Jul 16 12:40:49.493035 kubelet[1989]: E0716 12:40:49.492996 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"goldmane-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"goldmane-ca-bundle\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.493349 kubelet[1989]: W0716 12:40:49.493321 1989 reflector.go:561] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.493504 kubelet[1989]: E0716 12:40:49.493471 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.493684 kubelet[1989]: W0716 12:40:49.493655 1989 reflector.go:561] object-"calico-system"/"goldmane": failed to list *v1.ConfigMap: configmaps "goldmane" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.493846 kubelet[1989]: E0716 12:40:49.493811 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"goldmane\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"goldmane\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.495548 kubelet[1989]: E0716 12:40:49.495501 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"whisker-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"whisker-ca-bundle\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.500692 kubelet[1989]: W0716 12:40:49.500656 1989 reflector.go:561] object-"calico-system"/"whisker-backend-key-pair": failed to list *v1.Secret: secrets "whisker-backend-key-pair" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.500807 kubelet[1989]: E0716 12:40:49.500698 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"whisker-backend-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"whisker-backend-key-pair\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.500807 kubelet[1989]: W0716 12:40:49.500779 1989 reflector.go:561] object-"calico-system"/"goldmane-key-pair": failed to list *v1.Secret: secrets "goldmane-key-pair" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.501027 kubelet[1989]: E0716 12:40:49.500805 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"goldmane-key-pair\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"goldmane-key-pair\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.501027 kubelet[1989]: W0716 12:40:49.500884 1989 reflector.go:561] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:srv-uobsc.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object Jul 16 12:40:49.501027 kubelet[1989]: E0716 12:40:49.500911 1989 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"calico-apiserver-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"calico-apiserver-certs\" is forbidden: User \"system:node:srv-uobsc.gb1.brightbox.com\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'srv-uobsc.gb1.brightbox.com' and this object" logger="UnhandledError" Jul 16 12:40:49.508491 systemd[1]: Created slice kubepods-burstable-pod086a2a1b_2088_4be5_9c77_b637306b93da.slice. Jul 16 12:40:49.518294 systemd[1]: Created slice kubepods-besteffort-pod54e0dfc0_c0f4_400a_af04_d690a81a54ff.slice. Jul 16 12:40:49.529457 systemd[1]: Created slice kubepods-besteffort-pod437a1361_938b_4d42_b693_c4b3390c7f06.slice. Jul 16 12:40:49.538283 systemd[1]: Created slice kubepods-besteffort-pod5ac53c4c_94cf_444a_aa04_118dcd95f8bd.slice. Jul 16 12:40:49.547935 systemd[1]: Created slice kubepods-besteffort-podbd76a2da_b5d5_4275_be7c_55ce3a01702a.slice. Jul 16 12:40:49.558360 kubelet[1989]: I0716 12:40:49.558320 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/086a2a1b-2088-4be5-9c77-b637306b93da-config-volume\") pod \"coredns-7c65d6cfc9-97lv7\" (UID: \"086a2a1b-2088-4be5-9c77-b637306b93da\") " pod="kube-system/coredns-7c65d6cfc9-97lv7" Jul 16 12:40:49.558512 kubelet[1989]: I0716 12:40:49.558372 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hjwdj\" (UniqueName: \"kubernetes.io/projected/54e0dfc0-c0f4-400a-af04-d690a81a54ff-kube-api-access-hjwdj\") pod \"calico-kube-controllers-b8ffdbb55-r2nnz\" (UID: \"54e0dfc0-c0f4-400a-af04-d690a81a54ff\") " pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" Jul 16 12:40:49.558512 kubelet[1989]: I0716 12:40:49.558406 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-ca-bundle\") pod \"whisker-6457d7ddc7-4pl58\" (UID: \"437a1361-938b-4d42-b693-c4b3390c7f06\") " pod="calico-system/whisker-6457d7ddc7-4pl58" Jul 16 12:40:49.558512 kubelet[1989]: I0716 12:40:49.558435 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f377f6d0-6e59-4b6f-943d-6b38f4839100-config-volume\") pod \"coredns-7c65d6cfc9-8p4rf\" (UID: \"f377f6d0-6e59-4b6f-943d-6b38f4839100\") " pod="kube-system/coredns-7c65d6cfc9-8p4rf" Jul 16 12:40:49.558512 kubelet[1989]: I0716 12:40:49.558493 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5ac53c4c-94cf-444a-aa04-118dcd95f8bd-calico-apiserver-certs\") pod \"calico-apiserver-76cb86d967-4d62v\" (UID: \"5ac53c4c-94cf-444a-aa04-118dcd95f8bd\") " pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" Jul 16 12:40:49.558776 kubelet[1989]: I0716 12:40:49.558522 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkhx4\" (UniqueName: \"kubernetes.io/projected/086a2a1b-2088-4be5-9c77-b637306b93da-kube-api-access-rkhx4\") pod \"coredns-7c65d6cfc9-97lv7\" (UID: \"086a2a1b-2088-4be5-9c77-b637306b93da\") " pod="kube-system/coredns-7c65d6cfc9-97lv7" Jul 16 12:40:49.558776 kubelet[1989]: I0716 12:40:49.558549 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/bd76a2da-b5d5-4275-be7c-55ce3a01702a-config\") pod \"goldmane-58fd7646b9-vg42f\" (UID: \"bd76a2da-b5d5-4275-be7c-55ce3a01702a\") " pod="calico-system/goldmane-58fd7646b9-vg42f" Jul 16 12:40:49.558776 kubelet[1989]: I0716 12:40:49.558579 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/54e0dfc0-c0f4-400a-af04-d690a81a54ff-tigera-ca-bundle\") pod \"calico-kube-controllers-b8ffdbb55-r2nnz\" (UID: \"54e0dfc0-c0f4-400a-af04-d690a81a54ff\") " pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" Jul 16 12:40:49.558776 kubelet[1989]: I0716 12:40:49.558609 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5cb8f\" (UniqueName: \"kubernetes.io/projected/f377f6d0-6e59-4b6f-943d-6b38f4839100-kube-api-access-5cb8f\") pod \"coredns-7c65d6cfc9-8p4rf\" (UID: \"f377f6d0-6e59-4b6f-943d-6b38f4839100\") " pod="kube-system/coredns-7c65d6cfc9-8p4rf" Jul 16 12:40:49.558776 kubelet[1989]: I0716 12:40:49.558638 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9n9k\" (UniqueName: \"kubernetes.io/projected/ab651272-d47f-4948-b667-dab25752f7ab-kube-api-access-h9n9k\") pod \"calico-apiserver-76cb86d967-th55w\" (UID: \"ab651272-d47f-4948-b667-dab25752f7ab\") " pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" Jul 16 12:40:49.559148 kubelet[1989]: I0716 12:40:49.558669 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6d62n\" (UniqueName: \"kubernetes.io/projected/5ac53c4c-94cf-444a-aa04-118dcd95f8bd-kube-api-access-6d62n\") pod \"calico-apiserver-76cb86d967-4d62v\" (UID: \"5ac53c4c-94cf-444a-aa04-118dcd95f8bd\") " pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" Jul 16 12:40:49.559148 kubelet[1989]: I0716 12:40:49.558721 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bd76a2da-b5d5-4275-be7c-55ce3a01702a-goldmane-ca-bundle\") pod \"goldmane-58fd7646b9-vg42f\" (UID: \"bd76a2da-b5d5-4275-be7c-55ce3a01702a\") " pod="calico-system/goldmane-58fd7646b9-vg42f" Jul 16 12:40:49.559148 kubelet[1989]: I0716 12:40:49.558783 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/bd76a2da-b5d5-4275-be7c-55ce3a01702a-goldmane-key-pair\") pod \"goldmane-58fd7646b9-vg42f\" (UID: \"bd76a2da-b5d5-4275-be7c-55ce3a01702a\") " pod="calico-system/goldmane-58fd7646b9-vg42f" Jul 16 12:40:49.559148 kubelet[1989]: I0716 12:40:49.558817 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ab651272-d47f-4948-b667-dab25752f7ab-calico-apiserver-certs\") pod \"calico-apiserver-76cb86d967-th55w\" (UID: \"ab651272-d47f-4948-b667-dab25752f7ab\") " pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" Jul 16 12:40:49.559148 kubelet[1989]: I0716 12:40:49.558857 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kzkk7\" (UniqueName: \"kubernetes.io/projected/437a1361-938b-4d42-b693-c4b3390c7f06-kube-api-access-kzkk7\") pod \"whisker-6457d7ddc7-4pl58\" (UID: \"437a1361-938b-4d42-b693-c4b3390c7f06\") " pod="calico-system/whisker-6457d7ddc7-4pl58" Jul 16 12:40:49.559475 kubelet[1989]: I0716 12:40:49.558908 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-backend-key-pair\") pod \"whisker-6457d7ddc7-4pl58\" (UID: \"437a1361-938b-4d42-b693-c4b3390c7f06\") " pod="calico-system/whisker-6457d7ddc7-4pl58" Jul 16 12:40:49.559475 kubelet[1989]: I0716 12:40:49.558961 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5jbz\" (UniqueName: \"kubernetes.io/projected/bd76a2da-b5d5-4275-be7c-55ce3a01702a-kube-api-access-d5jbz\") pod \"goldmane-58fd7646b9-vg42f\" (UID: \"bd76a2da-b5d5-4275-be7c-55ce3a01702a\") " pod="calico-system/goldmane-58fd7646b9-vg42f" Jul 16 12:40:49.809116 env[1190]: time="2025-07-16T12:40:49.808561100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-8p4rf,Uid:f377f6d0-6e59-4b6f-943d-6b38f4839100,Namespace:kube-system,Attempt:0,}" Jul 16 12:40:49.814537 env[1190]: time="2025-07-16T12:40:49.814495876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-97lv7,Uid:086a2a1b-2088-4be5-9c77-b637306b93da,Namespace:kube-system,Attempt:0,}" Jul 16 12:40:49.841047 env[1190]: time="2025-07-16T12:40:49.840952472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b8ffdbb55-r2nnz,Uid:54e0dfc0-c0f4-400a-af04-d690a81a54ff,Namespace:calico-system,Attempt:0,}" Jul 16 12:40:49.920775 env[1190]: time="2025-07-16T12:40:49.919810860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 16 12:40:50.151158 env[1190]: time="2025-07-16T12:40:50.151050445Z" level=error msg="Failed to destroy network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.151739 env[1190]: time="2025-07-16T12:40:50.151685271Z" level=error msg="encountered an error cleaning up failed sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.151873 env[1190]: time="2025-07-16T12:40:50.151762326Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-97lv7,Uid:086a2a1b-2088-4be5-9c77-b637306b93da,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.154365 kubelet[1989]: E0716 12:40:50.152090 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.157222 kubelet[1989]: E0716 12:40:50.154324 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-97lv7" Jul 16 12:40:50.157222 kubelet[1989]: E0716 12:40:50.155817 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-97lv7" Jul 16 12:40:50.157222 kubelet[1989]: E0716 12:40:50.156266 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-97lv7_kube-system(086a2a1b-2088-4be5-9c77-b637306b93da)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-97lv7_kube-system(086a2a1b-2088-4be5-9c77-b637306b93da)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-97lv7" podUID="086a2a1b-2088-4be5-9c77-b637306b93da" Jul 16 12:40:50.167592 env[1190]: time="2025-07-16T12:40:50.167520585Z" level=error msg="Failed to destroy network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.168456 env[1190]: time="2025-07-16T12:40:50.168351898Z" level=error msg="encountered an error cleaning up failed sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.168701 env[1190]: time="2025-07-16T12:40:50.168640418Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b8ffdbb55-r2nnz,Uid:54e0dfc0-c0f4-400a-af04-d690a81a54ff,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.170394 kubelet[1989]: E0716 12:40:50.169168 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.170394 kubelet[1989]: E0716 12:40:50.169264 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" Jul 16 12:40:50.170394 kubelet[1989]: E0716 12:40:50.169313 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" Jul 16 12:40:50.170622 kubelet[1989]: E0716 12:40:50.169368 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-b8ffdbb55-r2nnz_calico-system(54e0dfc0-c0f4-400a-af04-d690a81a54ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-b8ffdbb55-r2nnz_calico-system(54e0dfc0-c0f4-400a-af04-d690a81a54ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" podUID="54e0dfc0-c0f4-400a-af04-d690a81a54ff" Jul 16 12:40:50.176340 env[1190]: time="2025-07-16T12:40:50.176257880Z" level=error msg="Failed to destroy network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.177011 env[1190]: time="2025-07-16T12:40:50.176964784Z" level=error msg="encountered an error cleaning up failed sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.177240 env[1190]: time="2025-07-16T12:40:50.177181756Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-8p4rf,Uid:f377f6d0-6e59-4b6f-943d-6b38f4839100,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.177646 kubelet[1989]: E0716 12:40:50.177597 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.177741 kubelet[1989]: E0716 12:40:50.177659 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-8p4rf" Jul 16 12:40:50.177741 kubelet[1989]: E0716 12:40:50.177687 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-8p4rf" Jul 16 12:40:50.177960 kubelet[1989]: E0716 12:40:50.177753 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-8p4rf_kube-system(f377f6d0-6e59-4b6f-943d-6b38f4839100)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-8p4rf_kube-system(f377f6d0-6e59-4b6f-943d-6b38f4839100)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-8p4rf" podUID="f377f6d0-6e59-4b6f-943d-6b38f4839100" Jul 16 12:40:50.613249 systemd[1]: Created slice kubepods-besteffort-podc89dbd0e_d645_4beb_a0eb_e54f765fb87a.slice. Jul 16 12:40:50.617248 env[1190]: time="2025-07-16T12:40:50.617199490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t9nvt,Uid:c89dbd0e-d645-4beb-a0eb-e54f765fb87a,Namespace:calico-system,Attempt:0,}" Jul 16 12:40:50.662725 kubelet[1989]: E0716 12:40:50.662664 1989 configmap.go:193] Couldn't get configMap calico-system/whisker-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Jul 16 12:40:50.668053 kubelet[1989]: E0716 12:40:50.667768 1989 secret.go:189] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Jul 16 12:40:50.668053 kubelet[1989]: E0716 12:40:50.667847 1989 configmap.go:193] Couldn't get configMap calico-system/goldmane: failed to sync configmap cache: timed out waiting for the condition Jul 16 12:40:50.668053 kubelet[1989]: E0716 12:40:50.667909 1989 configmap.go:193] Couldn't get configMap calico-system/goldmane-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Jul 16 12:40:50.668053 kubelet[1989]: E0716 12:40:50.667966 1989 secret.go:189] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Jul 16 12:40:50.668053 kubelet[1989]: E0716 12:40:50.668011 1989 secret.go:189] Couldn't get secret calico-system/goldmane-key-pair: failed to sync secret cache: timed out waiting for the condition Jul 16 12:40:50.670555 kubelet[1989]: E0716 12:40:50.670488 1989 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-ca-bundle podName:437a1361-938b-4d42-b693-c4b3390c7f06 nodeName:}" failed. No retries permitted until 2025-07-16 12:40:51.162805656 +0000 UTC m=+38.894313192 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "whisker-ca-bundle" (UniqueName: "kubernetes.io/configmap/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-ca-bundle") pod "whisker-6457d7ddc7-4pl58" (UID: "437a1361-938b-4d42-b693-c4b3390c7f06") : failed to sync configmap cache: timed out waiting for the condition Jul 16 12:40:50.670807 kubelet[1989]: E0716 12:40:50.670572 1989 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5ac53c4c-94cf-444a-aa04-118dcd95f8bd-calico-apiserver-certs podName:5ac53c4c-94cf-444a-aa04-118dcd95f8bd nodeName:}" failed. No retries permitted until 2025-07-16 12:40:51.170555052 +0000 UTC m=+38.902062594 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5ac53c4c-94cf-444a-aa04-118dcd95f8bd-calico-apiserver-certs") pod "calico-apiserver-76cb86d967-4d62v" (UID: "5ac53c4c-94cf-444a-aa04-118dcd95f8bd") : failed to sync secret cache: timed out waiting for the condition Jul 16 12:40:50.670807 kubelet[1989]: E0716 12:40:50.670706 1989 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/bd76a2da-b5d5-4275-be7c-55ce3a01702a-config podName:bd76a2da-b5d5-4275-be7c-55ce3a01702a nodeName:}" failed. No retries permitted until 2025-07-16 12:40:51.170627988 +0000 UTC m=+38.902135526 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config" (UniqueName: "kubernetes.io/configmap/bd76a2da-b5d5-4275-be7c-55ce3a01702a-config") pod "goldmane-58fd7646b9-vg42f" (UID: "bd76a2da-b5d5-4275-be7c-55ce3a01702a") : failed to sync configmap cache: timed out waiting for the condition Jul 16 12:40:50.670807 kubelet[1989]: E0716 12:40:50.670748 1989 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/bd76a2da-b5d5-4275-be7c-55ce3a01702a-goldmane-ca-bundle podName:bd76a2da-b5d5-4275-be7c-55ce3a01702a nodeName:}" failed. No retries permitted until 2025-07-16 12:40:51.170734254 +0000 UTC m=+38.902241791 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "goldmane-ca-bundle" (UniqueName: "kubernetes.io/configmap/bd76a2da-b5d5-4275-be7c-55ce3a01702a-goldmane-ca-bundle") pod "goldmane-58fd7646b9-vg42f" (UID: "bd76a2da-b5d5-4275-be7c-55ce3a01702a") : failed to sync configmap cache: timed out waiting for the condition Jul 16 12:40:50.671319 kubelet[1989]: E0716 12:40:50.670772 1989 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ab651272-d47f-4948-b667-dab25752f7ab-calico-apiserver-certs podName:ab651272-d47f-4948-b667-dab25752f7ab nodeName:}" failed. No retries permitted until 2025-07-16 12:40:51.170762159 +0000 UTC m=+38.902269690 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ab651272-d47f-4948-b667-dab25752f7ab-calico-apiserver-certs") pod "calico-apiserver-76cb86d967-th55w" (UID: "ab651272-d47f-4948-b667-dab25752f7ab") : failed to sync secret cache: timed out waiting for the condition Jul 16 12:40:50.671319 kubelet[1989]: E0716 12:40:50.670794 1989 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bd76a2da-b5d5-4275-be7c-55ce3a01702a-goldmane-key-pair podName:bd76a2da-b5d5-4275-be7c-55ce3a01702a nodeName:}" failed. No retries permitted until 2025-07-16 12:40:51.170784401 +0000 UTC m=+38.902291933 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "goldmane-key-pair" (UniqueName: "kubernetes.io/secret/bd76a2da-b5d5-4275-be7c-55ce3a01702a-goldmane-key-pair") pod "goldmane-58fd7646b9-vg42f" (UID: "bd76a2da-b5d5-4275-be7c-55ce3a01702a") : failed to sync secret cache: timed out waiting for the condition Jul 16 12:40:50.718157 env[1190]: time="2025-07-16T12:40:50.718024571Z" level=error msg="Failed to destroy network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.718683 env[1190]: time="2025-07-16T12:40:50.718635562Z" level=error msg="encountered an error cleaning up failed sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.718809 env[1190]: time="2025-07-16T12:40:50.718725470Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t9nvt,Uid:c89dbd0e-d645-4beb-a0eb-e54f765fb87a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.719101 kubelet[1989]: E0716 12:40:50.719050 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:50.719276 kubelet[1989]: E0716 12:40:50.719130 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:50.719276 kubelet[1989]: E0716 12:40:50.719252 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t9nvt" Jul 16 12:40:50.719458 kubelet[1989]: E0716 12:40:50.719338 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-t9nvt_calico-system(c89dbd0e-d645-4beb-a0eb-e54f765fb87a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-t9nvt_calico-system(c89dbd0e-d645-4beb-a0eb-e54f765fb87a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:50.812058 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1-shm.mount: Deactivated successfully. Jul 16 12:40:50.812235 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6-shm.mount: Deactivated successfully. Jul 16 12:40:50.919155 kubelet[1989]: I0716 12:40:50.918998 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:40:50.925355 env[1190]: time="2025-07-16T12:40:50.925274144Z" level=info msg="StopPodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\"" Jul 16 12:40:50.925908 kubelet[1989]: I0716 12:40:50.925857 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:40:50.928425 env[1190]: time="2025-07-16T12:40:50.927146302Z" level=info msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" Jul 16 12:40:50.930945 kubelet[1989]: I0716 12:40:50.930920 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:40:50.933639 env[1190]: time="2025-07-16T12:40:50.932753001Z" level=info msg="StopPodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\"" Jul 16 12:40:50.935952 kubelet[1989]: I0716 12:40:50.935921 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:40:50.937075 env[1190]: time="2025-07-16T12:40:50.936607828Z" level=info msg="StopPodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\"" Jul 16 12:40:51.061333 env[1190]: time="2025-07-16T12:40:51.061243628Z" level=error msg="StopPodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" failed" error="failed to destroy network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.062008 kubelet[1989]: E0716 12:40:51.061792 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:40:51.063902 kubelet[1989]: E0716 12:40:51.061916 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6"} Jul 16 12:40:51.063902 kubelet[1989]: E0716 12:40:51.063458 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f377f6d0-6e59-4b6f-943d-6b38f4839100\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:51.063902 kubelet[1989]: E0716 12:40:51.063710 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f377f6d0-6e59-4b6f-943d-6b38f4839100\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-8p4rf" podUID="f377f6d0-6e59-4b6f-943d-6b38f4839100" Jul 16 12:40:51.063902 kubelet[1989]: E0716 12:40:51.063605 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:40:51.063902 kubelet[1989]: E0716 12:40:51.063837 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b"} Jul 16 12:40:51.064734 env[1190]: time="2025-07-16T12:40:51.063347929Z" level=error msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" failed" error="failed to destroy network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.064832 kubelet[1989]: E0716 12:40:51.063947 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:51.064832 kubelet[1989]: E0716 12:40:51.063995 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:40:51.065781 env[1190]: time="2025-07-16T12:40:51.065733289Z" level=error msg="StopPodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" failed" error="failed to destroy network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.066261 kubelet[1989]: E0716 12:40:51.066081 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:40:51.066261 kubelet[1989]: E0716 12:40:51.066126 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1"} Jul 16 12:40:51.066261 kubelet[1989]: E0716 12:40:51.066189 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"086a2a1b-2088-4be5-9c77-b637306b93da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:51.066261 kubelet[1989]: E0716 12:40:51.066222 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"086a2a1b-2088-4be5-9c77-b637306b93da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-97lv7" podUID="086a2a1b-2088-4be5-9c77-b637306b93da" Jul 16 12:40:51.073767 env[1190]: time="2025-07-16T12:40:51.073716530Z" level=error msg="StopPodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" failed" error="failed to destroy network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.074076 kubelet[1989]: E0716 12:40:51.074036 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:40:51.074168 kubelet[1989]: E0716 12:40:51.074102 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943"} Jul 16 12:40:51.074252 kubelet[1989]: E0716 12:40:51.074144 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"54e0dfc0-c0f4-400a-af04-d690a81a54ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:51.074252 kubelet[1989]: E0716 12:40:51.074203 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"54e0dfc0-c0f4-400a-af04-d690a81a54ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" podUID="54e0dfc0-c0f4-400a-af04-d690a81a54ff" Jul 16 12:40:51.306948 env[1190]: time="2025-07-16T12:40:51.304976356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-th55w,Uid:ab651272-d47f-4948-b667-dab25752f7ab,Namespace:calico-apiserver,Attempt:0,}" Jul 16 12:40:51.345573 env[1190]: time="2025-07-16T12:40:51.345503033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-4d62v,Uid:5ac53c4c-94cf-444a-aa04-118dcd95f8bd,Namespace:calico-apiserver,Attempt:0,}" Jul 16 12:40:51.345894 env[1190]: time="2025-07-16T12:40:51.345507004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6457d7ddc7-4pl58,Uid:437a1361-938b-4d42-b693-c4b3390c7f06,Namespace:calico-system,Attempt:0,}" Jul 16 12:40:51.354107 env[1190]: time="2025-07-16T12:40:51.354067694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-vg42f,Uid:bd76a2da-b5d5-4275-be7c-55ce3a01702a,Namespace:calico-system,Attempt:0,}" Jul 16 12:40:51.472126 env[1190]: time="2025-07-16T12:40:51.471975566Z" level=error msg="Failed to destroy network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.472621 env[1190]: time="2025-07-16T12:40:51.472574110Z" level=error msg="encountered an error cleaning up failed sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.472734 env[1190]: time="2025-07-16T12:40:51.472681615Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-th55w,Uid:ab651272-d47f-4948-b667-dab25752f7ab,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.473847 kubelet[1989]: E0716 12:40:51.473232 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.473847 kubelet[1989]: E0716 12:40:51.473346 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" Jul 16 12:40:51.473847 kubelet[1989]: E0716 12:40:51.473386 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" Jul 16 12:40:51.477439 kubelet[1989]: E0716 12:40:51.473459 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-76cb86d967-th55w_calico-apiserver(ab651272-d47f-4948-b667-dab25752f7ab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-76cb86d967-th55w_calico-apiserver(ab651272-d47f-4948-b667-dab25752f7ab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" podUID="ab651272-d47f-4948-b667-dab25752f7ab" Jul 16 12:40:51.529058 env[1190]: time="2025-07-16T12:40:51.528979223Z" level=error msg="Failed to destroy network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.529770 env[1190]: time="2025-07-16T12:40:51.529723382Z" level=error msg="encountered an error cleaning up failed sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.529996 env[1190]: time="2025-07-16T12:40:51.529947598Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-vg42f,Uid:bd76a2da-b5d5-4275-be7c-55ce3a01702a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.533507 kubelet[1989]: E0716 12:40:51.530509 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.533507 kubelet[1989]: E0716 12:40:51.530633 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-58fd7646b9-vg42f" Jul 16 12:40:51.533507 kubelet[1989]: E0716 12:40:51.530667 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-58fd7646b9-vg42f" Jul 16 12:40:51.538290 env[1190]: time="2025-07-16T12:40:51.533000942Z" level=error msg="Failed to destroy network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.538290 env[1190]: time="2025-07-16T12:40:51.533556673Z" level=error msg="encountered an error cleaning up failed sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.538290 env[1190]: time="2025-07-16T12:40:51.533642423Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6457d7ddc7-4pl58,Uid:437a1361-938b-4d42-b693-c4b3390c7f06,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.538544 kubelet[1989]: E0716 12:40:51.530747 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-58fd7646b9-vg42f_calico-system(bd76a2da-b5d5-4275-be7c-55ce3a01702a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-58fd7646b9-vg42f_calico-system(bd76a2da-b5d5-4275-be7c-55ce3a01702a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-58fd7646b9-vg42f" podUID="bd76a2da-b5d5-4275-be7c-55ce3a01702a" Jul 16 12:40:51.538544 kubelet[1989]: E0716 12:40:51.533836 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.538544 kubelet[1989]: E0716 12:40:51.533913 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6457d7ddc7-4pl58" Jul 16 12:40:51.538882 kubelet[1989]: E0716 12:40:51.533959 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6457d7ddc7-4pl58" Jul 16 12:40:51.538882 kubelet[1989]: E0716 12:40:51.534030 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6457d7ddc7-4pl58_calico-system(437a1361-938b-4d42-b693-c4b3390c7f06)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6457d7ddc7-4pl58_calico-system(437a1361-938b-4d42-b693-c4b3390c7f06)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6457d7ddc7-4pl58" podUID="437a1361-938b-4d42-b693-c4b3390c7f06" Jul 16 12:40:51.563639 env[1190]: time="2025-07-16T12:40:51.563443297Z" level=error msg="Failed to destroy network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.565899 env[1190]: time="2025-07-16T12:40:51.565779096Z" level=error msg="encountered an error cleaning up failed sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.566022 env[1190]: time="2025-07-16T12:40:51.565892137Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-4d62v,Uid:5ac53c4c-94cf-444a-aa04-118dcd95f8bd,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.566252 kubelet[1989]: E0716 12:40:51.566185 1989 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:51.566384 kubelet[1989]: E0716 12:40:51.566278 1989 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" Jul 16 12:40:51.566384 kubelet[1989]: E0716 12:40:51.566323 1989 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" Jul 16 12:40:51.566520 kubelet[1989]: E0716 12:40:51.566394 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-76cb86d967-4d62v_calico-apiserver(5ac53c4c-94cf-444a-aa04-118dcd95f8bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-76cb86d967-4d62v_calico-apiserver(5ac53c4c-94cf-444a-aa04-118dcd95f8bd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" podUID="5ac53c4c-94cf-444a-aa04-118dcd95f8bd" Jul 16 12:40:51.807273 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356-shm.mount: Deactivated successfully. Jul 16 12:40:51.944904 kubelet[1989]: I0716 12:40:51.944697 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:40:51.949043 env[1190]: time="2025-07-16T12:40:51.948966576Z" level=info msg="StopPodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\"" Jul 16 12:40:51.970715 kubelet[1989]: I0716 12:40:51.969200 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:40:51.972114 env[1190]: time="2025-07-16T12:40:51.972066784Z" level=info msg="StopPodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\"" Jul 16 12:40:51.979750 kubelet[1989]: I0716 12:40:51.978613 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:40:51.980939 env[1190]: time="2025-07-16T12:40:51.980901310Z" level=info msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" Jul 16 12:40:51.990784 kubelet[1989]: I0716 12:40:51.989496 1989 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:40:51.990992 env[1190]: time="2025-07-16T12:40:51.990510192Z" level=info msg="StopPodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\"" Jul 16 12:40:52.059669 env[1190]: time="2025-07-16T12:40:52.059592196Z" level=error msg="StopPodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" failed" error="failed to destroy network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:52.060158 kubelet[1989]: E0716 12:40:52.060091 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:40:52.060297 kubelet[1989]: E0716 12:40:52.060252 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be"} Jul 16 12:40:52.060402 kubelet[1989]: E0716 12:40:52.060363 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ac53c4c-94cf-444a-aa04-118dcd95f8bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:52.060537 kubelet[1989]: E0716 12:40:52.060419 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ac53c4c-94cf-444a-aa04-118dcd95f8bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" podUID="5ac53c4c-94cf-444a-aa04-118dcd95f8bd" Jul 16 12:40:52.060646 env[1190]: time="2025-07-16T12:40:52.059826167Z" level=error msg="StopPodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" failed" error="failed to destroy network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:52.060895 kubelet[1989]: E0716 12:40:52.060822 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:40:52.060994 kubelet[1989]: E0716 12:40:52.060900 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97"} Jul 16 12:40:52.060994 kubelet[1989]: E0716 12:40:52.060962 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bd76a2da-b5d5-4275-be7c-55ce3a01702a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:52.061149 kubelet[1989]: E0716 12:40:52.060992 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bd76a2da-b5d5-4275-be7c-55ce3a01702a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-58fd7646b9-vg42f" podUID="bd76a2da-b5d5-4275-be7c-55ce3a01702a" Jul 16 12:40:52.093949 env[1190]: time="2025-07-16T12:40:52.093853476Z" level=error msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" failed" error="failed to destroy network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:52.094249 kubelet[1989]: E0716 12:40:52.094182 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:40:52.094361 kubelet[1989]: E0716 12:40:52.094263 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8"} Jul 16 12:40:52.094361 kubelet[1989]: E0716 12:40:52.094338 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"437a1361-938b-4d42-b693-c4b3390c7f06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:52.094548 kubelet[1989]: E0716 12:40:52.094396 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"437a1361-938b-4d42-b693-c4b3390c7f06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6457d7ddc7-4pl58" podUID="437a1361-938b-4d42-b693-c4b3390c7f06" Jul 16 12:40:52.108934 env[1190]: time="2025-07-16T12:40:52.108822864Z" level=error msg="StopPodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" failed" error="failed to destroy network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:40:52.109342 kubelet[1989]: E0716 12:40:52.109260 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:40:52.109442 kubelet[1989]: E0716 12:40:52.109356 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356"} Jul 16 12:40:52.109442 kubelet[1989]: E0716 12:40:52.109423 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab651272-d47f-4948-b667-dab25752f7ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:40:52.109600 kubelet[1989]: E0716 12:40:52.109472 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab651272-d47f-4948-b667-dab25752f7ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" podUID="ab651272-d47f-4948-b667-dab25752f7ab" Jul 16 12:41:02.605664 env[1190]: time="2025-07-16T12:41:02.605467978Z" level=info msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" Jul 16 12:41:02.727387 env[1190]: time="2025-07-16T12:41:02.727302201Z" level=error msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" failed" error="failed to destroy network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:02.728107 kubelet[1989]: E0716 12:41:02.728010 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:41:02.728792 kubelet[1989]: E0716 12:41:02.728159 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b"} Jul 16 12:41:02.728792 kubelet[1989]: E0716 12:41:02.728255 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:41:02.728792 kubelet[1989]: E0716 12:41:02.728322 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c89dbd0e-d645-4beb-a0eb-e54f765fb87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t9nvt" podUID="c89dbd0e-d645-4beb-a0eb-e54f765fb87a" Jul 16 12:41:02.834225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount905812571.mount: Deactivated successfully. Jul 16 12:41:02.888914 env[1190]: time="2025-07-16T12:41:02.888797274Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:02.892312 env[1190]: time="2025-07-16T12:41:02.892248930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:02.895101 env[1190]: time="2025-07-16T12:41:02.895056767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:02.897627 env[1190]: time="2025-07-16T12:41:02.897540710Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:02.898523 env[1190]: time="2025-07-16T12:41:02.898442098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 16 12:41:02.952178 env[1190]: time="2025-07-16T12:41:02.952111969Z" level=info msg="CreateContainer within sandbox \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 16 12:41:02.978314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2031773894.mount: Deactivated successfully. Jul 16 12:41:02.992667 env[1190]: time="2025-07-16T12:41:02.992601342Z" level=info msg="CreateContainer within sandbox \"5fc2ca462cab78624c37b01644545c9bf77ba7fe90374c5455b75bba6add3dd0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f\"" Jul 16 12:41:02.995626 env[1190]: time="2025-07-16T12:41:02.995584366Z" level=info msg="StartContainer for \"464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f\"" Jul 16 12:41:03.031517 systemd[1]: Started cri-containerd-464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f.scope. Jul 16 12:41:03.085966 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 16 12:41:03.101567 kernel: audit: type=1400 audit(1752669663.076:1011): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.107334 kernel: audit: type=1300 audit(1752669663.076:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7ff429f866b8 items=0 ppid=2431 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:03.108030 kernel: audit: type=1327 audit(1752669663.076:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346566386337396238396666316533666665653436346136366366 Jul 16 12:41:03.108122 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.108178 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7ff429f866b8 items=0 ppid=2431 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:03.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346566386337396238396666316533666665653436346136366366 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.130764 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.131017 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.144684 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.144837 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.145734 kernel: audit: type=1400 audit(1752669663.076:1012): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.076000 audit: BPF prog-id=136 op=LOAD Jul 16 12:41:03.076000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0003e00e8 items=0 ppid=2431 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:03.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346566386337396238396666316533666665653436346136366366 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.084000 audit: BPF prog-id=137 op=LOAD Jul 16 12:41:03.084000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0003e0138 items=0 ppid=2431 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:03.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346566386337396238396666316533666665653436346136366366 Jul 16 12:41:03.085000 audit: BPF prog-id=137 op=UNLOAD Jul 16 12:41:03.085000 audit: BPF prog-id=136 op=UNLOAD Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:03.085000 audit: BPF prog-id=138 op=LOAD Jul 16 12:41:03.085000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0003e01c8 items=0 ppid=2431 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:03.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346566386337396238396666316533666665653436346136366366 Jul 16 12:41:03.160221 env[1190]: time="2025-07-16T12:41:03.158410013Z" level=info msg="StartContainer for \"464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f\" returns successfully" Jul 16 12:41:03.605571 env[1190]: time="2025-07-16T12:41:03.605390459Z" level=info msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" Jul 16 12:41:03.659793 env[1190]: time="2025-07-16T12:41:03.659713111Z" level=error msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" failed" error="failed to destroy network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:03.660800 kubelet[1989]: E0716 12:41:03.660730 1989 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:03.660957 kubelet[1989]: E0716 12:41:03.660841 1989 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8"} Jul 16 12:41:03.660957 kubelet[1989]: E0716 12:41:03.660933 1989 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"437a1361-938b-4d42-b693-c4b3390c7f06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:41:03.661147 kubelet[1989]: E0716 12:41:03.660968 1989 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"437a1361-938b-4d42-b693-c4b3390c7f06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6457d7ddc7-4pl58" podUID="437a1361-938b-4d42-b693-c4b3390c7f06" Jul 16 12:41:03.971273 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 16 12:41:03.971478 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 16 12:41:04.123969 systemd[1]: run-containerd-runc-k8s.io-464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f-runc.xp6m7G.mount: Deactivated successfully. Jul 16 12:41:04.218695 kubelet[1989]: I0716 12:41:04.216292 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5lq2k" podStartSLOduration=2.533384672 podStartE2EDuration="30.184129475s" podCreationTimestamp="2025-07-16 12:40:34 +0000 UTC" firstStartedPulling="2025-07-16 12:40:35.249697366 +0000 UTC m=+22.981204901" lastFinishedPulling="2025-07-16 12:41:02.900442168 +0000 UTC m=+50.631949704" observedRunningTime="2025-07-16 12:41:04.147731444 +0000 UTC m=+51.879239003" watchObservedRunningTime="2025-07-16 12:41:04.184129475 +0000 UTC m=+51.915637040" Jul 16 12:41:04.371052 env[1190]: time="2025-07-16T12:41:04.370981398Z" level=info msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" Jul 16 12:41:04.606919 env[1190]: time="2025-07-16T12:41:04.605940580Z" level=info msg="StopPodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\"" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.716 [INFO][3248] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.717 [INFO][3248] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" iface="eth0" netns="/var/run/netns/cni-d9d496c2-b73a-e743-8acb-66ecad471811" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.717 [INFO][3248] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" iface="eth0" netns="/var/run/netns/cni-d9d496c2-b73a-e743-8acb-66ecad471811" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.717 [INFO][3248] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" iface="eth0" netns="/var/run/netns/cni-d9d496c2-b73a-e743-8acb-66ecad471811" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.717 [INFO][3248] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.717 [INFO][3248] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.836 [INFO][3256] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.844 [INFO][3256] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.844 [INFO][3256] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.861 [WARNING][3256] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.861 [INFO][3256] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.864 [INFO][3256] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:04.868718 env[1190]: 2025-07-16 12:41:04.867 [INFO][3248] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:04.874193 env[1190]: time="2025-07-16T12:41:04.874034329Z" level=info msg="TearDown network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" successfully" Jul 16 12:41:04.874193 env[1190]: time="2025-07-16T12:41:04.874080705Z" level=info msg="StopPodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" returns successfully" Jul 16 12:41:04.872153 systemd[1]: run-netns-cni\x2dd9d496c2\x2db73a\x2de743\x2d8acb\x2d66ecad471811.mount: Deactivated successfully. Jul 16 12:41:04.876774 env[1190]: time="2025-07-16T12:41:04.876733628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b8ffdbb55-r2nnz,Uid:54e0dfc0-c0f4-400a-af04-d690a81a54ff,Namespace:calico-system,Attempt:1,}" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.545 [INFO][3227] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.546 [INFO][3227] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" iface="eth0" netns="/var/run/netns/cni-af573a50-696a-dd4a-b131-afdabbf98899" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.546 [INFO][3227] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" iface="eth0" netns="/var/run/netns/cni-af573a50-696a-dd4a-b131-afdabbf98899" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.548 [INFO][3227] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" iface="eth0" netns="/var/run/netns/cni-af573a50-696a-dd4a-b131-afdabbf98899" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.548 [INFO][3227] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.549 [INFO][3227] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.836 [INFO][3235] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.844 [INFO][3235] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.864 [INFO][3235] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.881 [WARNING][3235] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.881 [INFO][3235] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.886 [INFO][3235] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:04.891833 env[1190]: 2025-07-16 12:41:04.889 [INFO][3227] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:04.913288 env[1190]: time="2025-07-16T12:41:04.895427123Z" level=info msg="TearDown network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" successfully" Jul 16 12:41:04.913288 env[1190]: time="2025-07-16T12:41:04.895471497Z" level=info msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" returns successfully" Jul 16 12:41:04.895051 systemd[1]: run-netns-cni\x2daf573a50\x2d696a\x2ddd4a\x2db131\x2dafdabbf98899.mount: Deactivated successfully. Jul 16 12:41:05.089145 kubelet[1989]: I0716 12:41:05.088816 1989 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-ca-bundle\") pod \"437a1361-938b-4d42-b693-c4b3390c7f06\" (UID: \"437a1361-938b-4d42-b693-c4b3390c7f06\") " Jul 16 12:41:05.089145 kubelet[1989]: I0716 12:41:05.088908 1989 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kzkk7\" (UniqueName: \"kubernetes.io/projected/437a1361-938b-4d42-b693-c4b3390c7f06-kube-api-access-kzkk7\") pod \"437a1361-938b-4d42-b693-c4b3390c7f06\" (UID: \"437a1361-938b-4d42-b693-c4b3390c7f06\") " Jul 16 12:41:05.089145 kubelet[1989]: I0716 12:41:05.088975 1989 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-backend-key-pair\") pod \"437a1361-938b-4d42-b693-c4b3390c7f06\" (UID: \"437a1361-938b-4d42-b693-c4b3390c7f06\") " Jul 16 12:41:05.112920 kubelet[1989]: I0716 12:41:05.101593 1989 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "437a1361-938b-4d42-b693-c4b3390c7f06" (UID: "437a1361-938b-4d42-b693-c4b3390c7f06"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Jul 16 12:41:05.117447 kubelet[1989]: I0716 12:41:05.117407 1989 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/437a1361-938b-4d42-b693-c4b3390c7f06-kube-api-access-kzkk7" (OuterVolumeSpecName: "kube-api-access-kzkk7") pod "437a1361-938b-4d42-b693-c4b3390c7f06" (UID: "437a1361-938b-4d42-b693-c4b3390c7f06"). InnerVolumeSpecName "kube-api-access-kzkk7". PluginName "kubernetes.io/projected", VolumeGidValue "" Jul 16 12:41:05.124848 kubelet[1989]: I0716 12:41:05.122767 1989 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "437a1361-938b-4d42-b693-c4b3390c7f06" (UID: "437a1361-938b-4d42-b693-c4b3390c7f06"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" Jul 16 12:41:05.191672 kubelet[1989]: I0716 12:41:05.190462 1989 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-backend-key-pair\") on node \"srv-uobsc.gb1.brightbox.com\" DevicePath \"\"" Jul 16 12:41:05.191672 kubelet[1989]: I0716 12:41:05.190524 1989 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/437a1361-938b-4d42-b693-c4b3390c7f06-whisker-ca-bundle\") on node \"srv-uobsc.gb1.brightbox.com\" DevicePath \"\"" Jul 16 12:41:05.191672 kubelet[1989]: I0716 12:41:05.190544 1989 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-kzkk7\" (UniqueName: \"kubernetes.io/projected/437a1361-938b-4d42-b693-c4b3390c7f06-kube-api-access-kzkk7\") on node \"srv-uobsc.gb1.brightbox.com\" DevicePath \"\"" Jul 16 12:41:05.192484 systemd-networkd[1024]: cali6685da824e8: Link UP Jul 16 12:41:05.200610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:41:05.200783 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6685da824e8: link becomes ready Jul 16 12:41:05.201443 systemd-networkd[1024]: cali6685da824e8: Gained carrier Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.023 [INFO][3272] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.040 [INFO][3272] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0 calico-kube-controllers-b8ffdbb55- calico-system 54e0dfc0-c0f4-400a-af04-d690a81a54ff 931 0 2025-07-16 12:40:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:b8ffdbb55 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com calico-kube-controllers-b8ffdbb55-r2nnz eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6685da824e8 [] [] }} ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.040 [INFO][3272] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.087 [INFO][3290] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" HandleID="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.087 [INFO][3290] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" HandleID="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-uobsc.gb1.brightbox.com", "pod":"calico-kube-controllers-b8ffdbb55-r2nnz", "timestamp":"2025-07-16 12:41:05.087069064 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.087 [INFO][3290] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.088 [INFO][3290] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.088 [INFO][3290] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.116 [INFO][3290] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.129 [INFO][3290] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.136 [INFO][3290] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.141 [INFO][3290] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.144 [INFO][3290] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.144 [INFO][3290] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.147 [INFO][3290] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9 Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.153 [INFO][3290] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.163 [INFO][3290] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.129/26] block=192.168.99.128/26 handle="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.163 [INFO][3290] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.129/26] handle="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.163 [INFO][3290] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:05.231226 env[1190]: 2025-07-16 12:41:05.163 [INFO][3290] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.129/26] IPv6=[] ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" HandleID="k8s-pod-network.c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.233691 env[1190]: 2025-07-16 12:41:05.166 [INFO][3272] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0", GenerateName:"calico-kube-controllers-b8ffdbb55-", Namespace:"calico-system", SelfLink:"", UID:"54e0dfc0-c0f4-400a-af04-d690a81a54ff", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b8ffdbb55", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-b8ffdbb55-r2nnz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6685da824e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:05.233691 env[1190]: 2025-07-16 12:41:05.167 [INFO][3272] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.129/32] ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.233691 env[1190]: 2025-07-16 12:41:05.167 [INFO][3272] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6685da824e8 ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.233691 env[1190]: 2025-07-16 12:41:05.203 [INFO][3272] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.233691 env[1190]: 2025-07-16 12:41:05.204 [INFO][3272] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0", GenerateName:"calico-kube-controllers-b8ffdbb55-", Namespace:"calico-system", SelfLink:"", UID:"54e0dfc0-c0f4-400a-af04-d690a81a54ff", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b8ffdbb55", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9", Pod:"calico-kube-controllers-b8ffdbb55-r2nnz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6685da824e8", MAC:"06:c7:49:ed:78:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:05.233691 env[1190]: 2025-07-16 12:41:05.227 [INFO][3272] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9" Namespace="calico-system" Pod="calico-kube-controllers-b8ffdbb55-r2nnz" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:05.261202 env[1190]: time="2025-07-16T12:41:05.261107637Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:05.261947 env[1190]: time="2025-07-16T12:41:05.261855571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:05.262107 env[1190]: time="2025-07-16T12:41:05.262064349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:05.262475 env[1190]: time="2025-07-16T12:41:05.262419512Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9 pid=3332 runtime=io.containerd.runc.v2 Jul 16 12:41:05.284181 systemd[1]: Started cri-containerd-c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9.scope. Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.314000 audit: BPF prog-id=139 op=LOAD Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:05.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626235343037303336333637313138346166366630333138326433 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:05.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626235343037303336333637313138346166366630333138326433 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit: BPF prog-id=140 op=LOAD Jul 16 12:41:05.316000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a2350 items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:05.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626235343037303336333637313138346166366630333138326433 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit: BPF prog-id=141 op=LOAD Jul 16 12:41:05.316000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a2398 items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:05.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626235343037303336333637313138346166366630333138326433 Jul 16 12:41:05.316000 audit: BPF prog-id=141 op=UNLOAD Jul 16 12:41:05.316000 audit: BPF prog-id=140 op=UNLOAD Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { perfmon } for pid=3341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit[3341]: AVC avc: denied { bpf } for pid=3341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:05.316000 audit: BPF prog-id=142 op=LOAD Jul 16 12:41:05.316000 audit[3341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a27a8 items=0 ppid=3332 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:05.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331626235343037303336333637313138346166366630333138326433 Jul 16 12:41:05.386077 env[1190]: time="2025-07-16T12:41:05.381668113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b8ffdbb55-r2nnz,Uid:54e0dfc0-c0f4-400a-af04-d690a81a54ff,Namespace:calico-system,Attempt:1,} returns sandbox id \"c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9\"" Jul 16 12:41:05.388261 env[1190]: time="2025-07-16T12:41:05.386661493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\"" Jul 16 12:41:05.393178 systemd[1]: Removed slice kubepods-besteffort-pod437a1361_938b_4d42_b693_c4b3390c7f06.slice. Jul 16 12:41:05.505528 systemd[1]: Created slice kubepods-besteffort-pod6b1c9fb1_96a1_4a9a_87ba_2fc80b2bd3fa.slice. Jul 16 12:41:05.593217 kubelet[1989]: I0716 12:41:05.593150 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa-whisker-ca-bundle\") pod \"whisker-588f74d5c5-kqjrk\" (UID: \"6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa\") " pod="calico-system/whisker-588f74d5c5-kqjrk" Jul 16 12:41:05.594025 kubelet[1989]: I0716 12:41:05.593988 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ssv6x\" (UniqueName: \"kubernetes.io/projected/6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa-kube-api-access-ssv6x\") pod \"whisker-588f74d5c5-kqjrk\" (UID: \"6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa\") " pod="calico-system/whisker-588f74d5c5-kqjrk" Jul 16 12:41:05.594257 kubelet[1989]: I0716 12:41:05.594209 1989 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa-whisker-backend-key-pair\") pod \"whisker-588f74d5c5-kqjrk\" (UID: \"6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa\") " pod="calico-system/whisker-588f74d5c5-kqjrk" Jul 16 12:41:05.606744 env[1190]: time="2025-07-16T12:41:05.604322786Z" level=info msg="StopPodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\"" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.716 [INFO][3374] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.716 [INFO][3374] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" iface="eth0" netns="/var/run/netns/cni-161d099c-aefa-f225-56c2-43a963fd38d4" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.716 [INFO][3374] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" iface="eth0" netns="/var/run/netns/cni-161d099c-aefa-f225-56c2-43a963fd38d4" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.716 [INFO][3374] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" iface="eth0" netns="/var/run/netns/cni-161d099c-aefa-f225-56c2-43a963fd38d4" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.717 [INFO][3374] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.717 [INFO][3374] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.753 [INFO][3383] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.753 [INFO][3383] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.753 [INFO][3383] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.763 [WARNING][3383] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.763 [INFO][3383] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.766 [INFO][3383] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:05.771244 env[1190]: 2025-07-16 12:41:05.769 [INFO][3374] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:05.772390 env[1190]: time="2025-07-16T12:41:05.772344754Z" level=info msg="TearDown network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" successfully" Jul 16 12:41:05.772534 env[1190]: time="2025-07-16T12:41:05.772486104Z" level=info msg="StopPodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" returns successfully" Jul 16 12:41:05.773556 env[1190]: time="2025-07-16T12:41:05.773495381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-97lv7,Uid:086a2a1b-2088-4be5-9c77-b637306b93da,Namespace:kube-system,Attempt:1,}" Jul 16 12:41:05.811351 env[1190]: time="2025-07-16T12:41:05.811289262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-588f74d5c5-kqjrk,Uid:6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa,Namespace:calico-system,Attempt:0,}" Jul 16 12:41:05.883827 systemd[1]: run-containerd-runc-k8s.io-464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f-runc.Wf8kBX.mount: Deactivated successfully. Jul 16 12:41:05.884002 systemd[1]: var-lib-kubelet-pods-437a1361\x2d938b\x2d4d42\x2db693\x2dc4b3390c7f06-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Jul 16 12:41:05.884106 systemd[1]: run-netns-cni\x2d161d099c\x2daefa\x2df225\x2d56c2\x2d43a963fd38d4.mount: Deactivated successfully. Jul 16 12:41:05.884199 systemd[1]: var-lib-kubelet-pods-437a1361\x2d938b\x2d4d42\x2db693\x2dc4b3390c7f06-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkzkk7.mount: Deactivated successfully. Jul 16 12:41:05.994974 systemd-networkd[1024]: calie618396647f: Link UP Jul 16 12:41:05.999445 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie618396647f: link becomes ready Jul 16 12:41:05.998770 systemd-networkd[1024]: calie618396647f: Gained carrier Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.826 [INFO][3389] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.842 [INFO][3389] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0 coredns-7c65d6cfc9- kube-system 086a2a1b-2088-4be5-9c77-b637306b93da 961 0 2025-07-16 12:40:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com coredns-7c65d6cfc9-97lv7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie618396647f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.843 [INFO][3389] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.921 [INFO][3414] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" HandleID="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.921 [INFO][3414] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" HandleID="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df7f0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-uobsc.gb1.brightbox.com", "pod":"coredns-7c65d6cfc9-97lv7", "timestamp":"2025-07-16 12:41:05.921495398 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.922 [INFO][3414] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.922 [INFO][3414] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.922 [INFO][3414] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.939 [INFO][3414] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.946 [INFO][3414] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.954 [INFO][3414] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.957 [INFO][3414] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.964 [INFO][3414] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.964 [INFO][3414] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.967 [INFO][3414] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.974 [INFO][3414] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.983 [INFO][3414] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.130/26] block=192.168.99.128/26 handle="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.983 [INFO][3414] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.130/26] handle="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.983 [INFO][3414] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:06.027474 env[1190]: 2025-07-16 12:41:05.983 [INFO][3414] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.130/26] IPv6=[] ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" HandleID="k8s-pod-network.2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.029563 env[1190]: 2025-07-16 12:41:05.986 [INFO][3389] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"086a2a1b-2088-4be5-9c77-b637306b93da", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7c65d6cfc9-97lv7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie618396647f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:06.029563 env[1190]: 2025-07-16 12:41:05.986 [INFO][3389] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.130/32] ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.029563 env[1190]: 2025-07-16 12:41:05.986 [INFO][3389] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie618396647f ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.029563 env[1190]: 2025-07-16 12:41:06.000 [INFO][3389] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.029563 env[1190]: 2025-07-16 12:41:06.001 [INFO][3389] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"086a2a1b-2088-4be5-9c77-b637306b93da", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c", Pod:"coredns-7c65d6cfc9-97lv7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie618396647f", MAC:"b6:a0:ac:94:c3:3d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:06.029563 env[1190]: 2025-07-16 12:41:06.024 [INFO][3389] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-97lv7" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:06.099018 env[1190]: time="2025-07-16T12:41:06.092939211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:06.099018 env[1190]: time="2025-07-16T12:41:06.093019419Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:06.099018 env[1190]: time="2025-07-16T12:41:06.093053576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:06.099018 env[1190]: time="2025-07-16T12:41:06.093239560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c pid=3471 runtime=io.containerd.runc.v2 Jul 16 12:41:06.128172 systemd-networkd[1024]: cali7a4d572c60a: Link UP Jul 16 12:41:06.139940 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7a4d572c60a: link becomes ready Jul 16 12:41:06.139602 systemd-networkd[1024]: cali7a4d572c60a: Gained carrier Jul 16 12:41:06.181000 audit[3491]: AVC avc: denied { write } for pid=3491 comm="tee" name="fd" dev="proc" ino=30131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.181000 audit[3491]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff664567be a2=241 a3=1b6 items=1 ppid=3448 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.181000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 16 12:41:06.181000 audit: PATH item=0 name="/dev/fd/63" inode=30978 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.191836 systemd[1]: run-containerd-runc-k8s.io-464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f-runc.5S9Jrt.mount: Deactivated successfully. Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.866 [INFO][3400] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.894 [INFO][3400] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0 whisker-588f74d5c5- calico-system 6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa 955 0 2025-07-16 12:41:05 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:588f74d5c5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com whisker-588f74d5c5-kqjrk eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali7a4d572c60a [] [] }} ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.895 [INFO][3400] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.976 [INFO][3421] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" HandleID="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.977 [INFO][3421] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" HandleID="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9870), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-uobsc.gb1.brightbox.com", "pod":"whisker-588f74d5c5-kqjrk", "timestamp":"2025-07-16 12:41:05.976209888 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.977 [INFO][3421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.983 [INFO][3421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:05.983 [INFO][3421] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.041 [INFO][3421] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.048 [INFO][3421] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.054 [INFO][3421] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.065 [INFO][3421] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.070 [INFO][3421] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.070 [INFO][3421] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.074 [INFO][3421] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5 Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.083 [INFO][3421] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.111 [INFO][3421] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.131/26] block=192.168.99.128/26 handle="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.111 [INFO][3421] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.131/26] handle="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.111 [INFO][3421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:06.193336 env[1190]: 2025-07-16 12:41:06.111 [INFO][3421] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.131/26] IPv6=[] ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" HandleID="k8s-pod-network.a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.196222 env[1190]: 2025-07-16 12:41:06.115 [INFO][3400] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0", GenerateName:"whisker-588f74d5c5-", Namespace:"calico-system", SelfLink:"", UID:"6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"588f74d5c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"whisker-588f74d5c5-kqjrk", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.99.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali7a4d572c60a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:06.196222 env[1190]: 2025-07-16 12:41:06.116 [INFO][3400] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.131/32] ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.196222 env[1190]: 2025-07-16 12:41:06.116 [INFO][3400] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7a4d572c60a ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.196222 env[1190]: 2025-07-16 12:41:06.141 [INFO][3400] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.196222 env[1190]: 2025-07-16 12:41:06.141 [INFO][3400] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0", GenerateName:"whisker-588f74d5c5-", Namespace:"calico-system", SelfLink:"", UID:"6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"588f74d5c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5", Pod:"whisker-588f74d5c5-kqjrk", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.99.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali7a4d572c60a", MAC:"e2:10:d4:75:69:d5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:06.196222 env[1190]: 2025-07-16 12:41:06.176 [INFO][3400] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5" Namespace="calico-system" Pod="whisker-588f74d5c5-kqjrk" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--588f74d5c5--kqjrk-eth0" Jul 16 12:41:06.222063 systemd[1]: Started cri-containerd-2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c.scope. Jul 16 12:41:06.239000 audit[3494]: AVC avc: denied { write } for pid=3494 comm="tee" name="fd" dev="proc" ino=30156 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.239000 audit[3494]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0692d7cd a2=241 a3=1b6 items=1 ppid=3444 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.239000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 16 12:41:06.239000 audit: PATH item=0 name="/dev/fd/63" inode=30990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.254949 env[1190]: time="2025-07-16T12:41:06.254175073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:06.254949 env[1190]: time="2025-07-16T12:41:06.254306874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:06.254949 env[1190]: time="2025-07-16T12:41:06.254327234Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:06.254949 env[1190]: time="2025-07-16T12:41:06.254897653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5 pid=3535 runtime=io.containerd.runc.v2 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit: BPF prog-id=143 op=LOAD Jul 16 12:41:06.264000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.264000 audit[3505]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3471 pid=3505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266346139373033653934366163353766383337653166633262656231 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3471 pid=3505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266346139373033653934366163353766383337653166633262656231 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit: BPF prog-id=144 op=LOAD Jul 16 12:41:06.265000 audit[3505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fa750 items=0 ppid=3471 pid=3505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266346139373033653934366163353766383337653166633262656231 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit: BPF prog-id=145 op=LOAD Jul 16 12:41:06.265000 audit[3505]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fa798 items=0 ppid=3471 pid=3505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266346139373033653934366163353766383337653166633262656231 Jul 16 12:41:06.265000 audit: BPF prog-id=145 op=UNLOAD Jul 16 12:41:06.265000 audit: BPF prog-id=144 op=UNLOAD Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { perfmon } for pid=3505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit[3505]: AVC avc: denied { bpf } for pid=3505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.265000 audit: BPF prog-id=146 op=LOAD Jul 16 12:41:06.265000 audit[3505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001faba8 items=0 ppid=3471 pid=3505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266346139373033653934366163353766383337653166633262656231 Jul 16 12:41:06.285781 systemd[1]: Started cri-containerd-a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5.scope. Jul 16 12:41:06.331221 env[1190]: time="2025-07-16T12:41:06.331146922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-97lv7,Uid:086a2a1b-2088-4be5-9c77-b637306b93da,Namespace:kube-system,Attempt:1,} returns sandbox id \"2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c\"" Jul 16 12:41:06.334772 env[1190]: time="2025-07-16T12:41:06.334727342Z" level=info msg="CreateContainer within sandbox \"2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.387000 audit: BPF prog-id=147 op=LOAD Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3535 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132653163663339396664326163666262656636316162353630626261 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3535 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132653163663339396664326163666262656636316162353630626261 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit: BPF prog-id=148 op=LOAD Jul 16 12:41:06.388000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000388350 items=0 ppid=3535 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132653163663339396664326163666262656636316162353630626261 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.388000 audit: BPF prog-id=149 op=LOAD Jul 16 12:41:06.388000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000388398 items=0 ppid=3535 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132653163663339396664326163666262656636316162353630626261 Jul 16 12:41:06.389000 audit: BPF prog-id=149 op=UNLOAD Jul 16 12:41:06.389000 audit: BPF prog-id=148 op=UNLOAD Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.389000 audit: BPF prog-id=150 op=LOAD Jul 16 12:41:06.389000 audit[3553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003887a8 items=0 ppid=3535 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132653163663339396664326163666262656636316162353630626261 Jul 16 12:41:06.423115 env[1190]: time="2025-07-16T12:41:06.423054874Z" level=info msg="CreateContainer within sandbox \"2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fdf364a71ca49b756ef141f3f3169c75ea65c2ed17808981ee909cfbfbe6749c\"" Jul 16 12:41:06.424249 env[1190]: time="2025-07-16T12:41:06.424212913Z" level=info msg="StartContainer for \"fdf364a71ca49b756ef141f3f3169c75ea65c2ed17808981ee909cfbfbe6749c\"" Jul 16 12:41:06.455239 systemd[1]: Started cri-containerd-fdf364a71ca49b756ef141f3f3169c75ea65c2ed17808981ee909cfbfbe6749c.scope. Jul 16 12:41:06.488000 audit[3622]: AVC avc: denied { write } for pid=3622 comm="tee" name="fd" dev="proc" ino=30343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.488000 audit[3622]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe79e9b7cd a2=241 a3=1b6 items=1 ppid=3440 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.488000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 16 12:41:06.488000 audit: PATH item=0 name="/dev/fd/63" inode=30330 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.488000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.489000 audit[3626]: AVC avc: denied { write } for pid=3626 comm="tee" name="fd" dev="proc" ino=30347 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.489000 audit[3626]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb531e7cd a2=241 a3=1b6 items=1 ppid=3456 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.489000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 16 12:41:06.489000 audit: PATH item=0 name="/dev/fd/63" inode=30340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.489000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit: BPF prog-id=151 op=LOAD Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3471 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664663336346137316361343962373536656631343166336633313639 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3471 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664663336346137316361343962373536656631343166336633313639 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit: BPF prog-id=152 op=LOAD Jul 16 12:41:06.519000 audit[3611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a06b0 items=0 ppid=3471 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664663336346137316361343962373536656631343166336633313639 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.519000 audit: BPF prog-id=153 op=LOAD Jul 16 12:41:06.519000 audit[3611]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a06f8 items=0 ppid=3471 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664663336346137316361343962373536656631343166336633313639 Jul 16 12:41:06.520000 audit: BPF prog-id=153 op=UNLOAD Jul 16 12:41:06.520000 audit: BPF prog-id=152 op=UNLOAD Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:06.520000 audit: BPF prog-id=154 op=LOAD Jul 16 12:41:06.520000 audit[3611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a0b08 items=0 ppid=3471 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664663336346137316361343962373536656631343166336633313639 Jul 16 12:41:06.545000 audit[3583]: AVC avc: denied { write } for pid=3583 comm="tee" name="fd" dev="proc" ino=30359 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.545000 audit[3583]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe17ed67ce a2=241 a3=1b6 items=1 ppid=3439 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.545000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 16 12:41:06.545000 audit: PATH item=0 name="/dev/fd/63" inode=31122 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.545000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.559890 env[1190]: time="2025-07-16T12:41:06.559797493Z" level=info msg="StartContainer for \"fdf364a71ca49b756ef141f3f3169c75ea65c2ed17808981ee909cfbfbe6749c\" returns successfully" Jul 16 12:41:06.582000 audit[3597]: AVC avc: denied { write } for pid=3597 comm="tee" name="fd" dev="proc" ino=30363 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.582000 audit[3597]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2b7897bd a2=241 a3=1b6 items=1 ppid=3452 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.582000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 16 12:41:06.582000 audit: PATH item=0 name="/dev/fd/63" inode=30246 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.582000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.606138 env[1190]: time="2025-07-16T12:41:06.606072903Z" level=info msg="StopPodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\"" Jul 16 12:41:06.606626 env[1190]: time="2025-07-16T12:41:06.606579739Z" level=info msg="StopPodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\"" Jul 16 12:41:06.609562 env[1190]: time="2025-07-16T12:41:06.608605970Z" level=info msg="StopPodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\"" Jul 16 12:41:06.616899 kubelet[1989]: I0716 12:41:06.616195 1989 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="437a1361-938b-4d42-b693-c4b3390c7f06" path="/var/lib/kubelet/pods/437a1361-938b-4d42-b693-c4b3390c7f06/volumes" Jul 16 12:41:06.703066 env[1190]: time="2025-07-16T12:41:06.703001204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-588f74d5c5-kqjrk,Uid:6b1c9fb1-96a1-4a9a-87ba-2fc80b2bd3fa,Namespace:calico-system,Attempt:0,} returns sandbox id \"a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5\"" Jul 16 12:41:06.814000 audit[3645]: AVC avc: denied { write } for pid=3645 comm="tee" name="fd" dev="proc" ino=31264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:06.814000 audit[3645]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd442517cf a2=241 a3=1b6 items=1 ppid=3450 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:06.814000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 16 12:41:06.814000 audit: PATH item=0 name="/dev/fd/63" inode=30365 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:06.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:06.961000 audit[3624]: AVC avc: denied { getattr } for pid=3624 comm="coredns" path="cgroup:[4026532858]" dev="nsfs" ino=4026532858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c631,c986 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Jul 16 12:41:06.961000 audit[3624]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a798 a2=c000127078 a3=0 items=0 ppid=3471 pid=3624 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c631,c986 key=(null) Jul 16 12:41:06.961000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Jul 16 12:41:07.138598 systemd-networkd[1024]: cali6685da824e8: Gained IPv6LL Jul 16 12:41:07.191193 systemd-networkd[1024]: calie618396647f: Gained IPv6LL Jul 16 12:41:07.192000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.192000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030ebb00 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:41:07.193000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.193000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00263af90 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:41:07.193000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:41:07.192000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:06.929 [INFO][3673] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:06.929 [INFO][3673] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" iface="eth0" netns="/var/run/netns/cni-a6bbe70b-67a5-4b3f-fe50-f853a3a6f740" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:06.930 [INFO][3673] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" iface="eth0" netns="/var/run/netns/cni-a6bbe70b-67a5-4b3f-fe50-f853a3a6f740" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:06.932 [INFO][3673] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" iface="eth0" netns="/var/run/netns/cni-a6bbe70b-67a5-4b3f-fe50-f853a3a6f740" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:06.932 [INFO][3673] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:06.932 [INFO][3673] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.102 [INFO][3716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.103 [INFO][3716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.107 [INFO][3716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.138 [WARNING][3716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.138 [INFO][3716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.142 [INFO][3716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:07.196561 env[1190]: 2025-07-16 12:41:07.144 [INFO][3673] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:07.199923 systemd[1]: run-netns-cni\x2da6bbe70b\x2d67a5\x2d4b3f\x2dfe50\x2df853a3a6f740.mount: Deactivated successfully. Jul 16 12:41:07.208896 env[1190]: time="2025-07-16T12:41:07.205001798Z" level=info msg="TearDown network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" successfully" Jul 16 12:41:07.208896 env[1190]: time="2025-07-16T12:41:07.205066796Z" level=info msg="StopPodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" returns successfully" Jul 16 12:41:07.208896 env[1190]: time="2025-07-16T12:41:07.206214737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-vg42f,Uid:bd76a2da-b5d5-4275-be7c-55ce3a01702a,Namespace:calico-system,Attempt:1,}" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:06.951 [INFO][3705] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:06.951 [INFO][3705] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" iface="eth0" netns="/var/run/netns/cni-e356f90a-16f5-6c40-432f-c9835c971562" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:06.952 [INFO][3705] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" iface="eth0" netns="/var/run/netns/cni-e356f90a-16f5-6c40-432f-c9835c971562" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:06.952 [INFO][3705] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" iface="eth0" netns="/var/run/netns/cni-e356f90a-16f5-6c40-432f-c9835c971562" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:06.952 [INFO][3705] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:06.952 [INFO][3705] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.115 [INFO][3725] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.115 [INFO][3725] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.142 [INFO][3725] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.220 [WARNING][3725] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.220 [INFO][3725] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.223 [INFO][3725] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:07.233154 env[1190]: 2025-07-16 12:41:07.228 [INFO][3705] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:07.237675 systemd[1]: run-netns-cni\x2de356f90a\x2d16f5\x2d6c40\x2d432f\x2dc9835c971562.mount: Deactivated successfully. Jul 16 12:41:07.241058 env[1190]: time="2025-07-16T12:41:07.241002982Z" level=info msg="TearDown network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" successfully" Jul 16 12:41:07.241219 env[1190]: time="2025-07-16T12:41:07.241184833Z" level=info msg="StopPodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" returns successfully" Jul 16 12:41:07.242444 env[1190]: time="2025-07-16T12:41:07.242399896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-4d62v,Uid:5ac53c4c-94cf-444a-aa04-118dcd95f8bd,Namespace:calico-apiserver,Attempt:1,}" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:06.924 [INFO][3696] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:06.924 [INFO][3696] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" iface="eth0" netns="/var/run/netns/cni-30eccca0-32e4-b779-61bc-a74e5a4b0e99" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:06.931 [INFO][3696] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" iface="eth0" netns="/var/run/netns/cni-30eccca0-32e4-b779-61bc-a74e5a4b0e99" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:06.932 [INFO][3696] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" iface="eth0" netns="/var/run/netns/cni-30eccca0-32e4-b779-61bc-a74e5a4b0e99" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:06.932 [INFO][3696] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:06.932 [INFO][3696] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.156 [INFO][3715] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.157 [INFO][3715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.223 [INFO][3715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.240 [WARNING][3715] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.240 [INFO][3715] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.255 [INFO][3715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:07.263992 env[1190]: 2025-07-16 12:41:07.262 [INFO][3696] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:07.265285 env[1190]: time="2025-07-16T12:41:07.265233736Z" level=info msg="TearDown network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" successfully" Jul 16 12:41:07.265470 env[1190]: time="2025-07-16T12:41:07.265427687Z" level=info msg="StopPodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" returns successfully" Jul 16 12:41:07.266682 env[1190]: time="2025-07-16T12:41:07.266645222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-8p4rf,Uid:f377f6d0-6e59-4b6f-943d-6b38f4839100,Namespace:kube-system,Attempt:1,}" Jul 16 12:41:07.389244 systemd-networkd[1024]: cali7a4d572c60a: Gained IPv6LL Jul 16 12:41:07.604679 env[1190]: time="2025-07-16T12:41:07.604623239Z" level=info msg="StopPodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\"" Jul 16 12:41:07.725770 systemd-networkd[1024]: caliec3ad697101: Link UP Jul 16 12:41:07.737072 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:41:07.737305 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec3ad697101: link becomes ready Jul 16 12:41:07.737575 systemd-networkd[1024]: caliec3ad697101: Gained carrier Jul 16 12:41:07.750236 kubelet[1989]: I0716 12:41:07.749980 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-97lv7" podStartSLOduration=49.749939221 podStartE2EDuration="49.749939221s" podCreationTimestamp="2025-07-16 12:40:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-16 12:41:07.136725727 +0000 UTC m=+54.868233289" watchObservedRunningTime="2025-07-16 12:41:07.749939221 +0000 UTC m=+55.481446764" Jul 16 12:41:07.757000 audit[3813]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:07.757000 audit[3813]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc944aafd0 a2=0 a3=7ffc944aafbc items=0 ppid=2128 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:07.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:07.768000 audit[3813]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:07.768000 audit[3813]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc944aafd0 a2=0 a3=0 items=0 ppid=2128 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:07.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.353 [INFO][3737] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.411 [INFO][3737] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0 goldmane-58fd7646b9- calico-system bd76a2da-b5d5-4275-be7c-55ce3a01702a 978 0 2025-07-16 12:40:34 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:58fd7646b9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com goldmane-58fd7646b9-vg42f eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] caliec3ad697101 [] [] }} ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.411 [INFO][3737] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.567 [INFO][3777] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" HandleID="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.567 [INFO][3777] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" HandleID="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd6c0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-uobsc.gb1.brightbox.com", "pod":"goldmane-58fd7646b9-vg42f", "timestamp":"2025-07-16 12:41:07.566961911 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.567 [INFO][3777] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.567 [INFO][3777] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.567 [INFO][3777] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.585 [INFO][3777] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.595 [INFO][3777] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.649 [INFO][3777] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.653 [INFO][3777] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.658 [INFO][3777] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.658 [INFO][3777] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.670 [INFO][3777] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.685 [INFO][3777] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.701 [INFO][3777] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.132/26] block=192.168.99.128/26 handle="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.701 [INFO][3777] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.132/26] handle="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.701 [INFO][3777] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:07.795808 env[1190]: 2025-07-16 12:41:07.701 [INFO][3777] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.132/26] IPv6=[] ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" HandleID="k8s-pod-network.1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.797218 env[1190]: 2025-07-16 12:41:07.704 [INFO][3737] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"bd76a2da-b5d5-4275-be7c-55ce3a01702a", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-58fd7646b9-vg42f", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.99.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"caliec3ad697101", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:07.797218 env[1190]: 2025-07-16 12:41:07.704 [INFO][3737] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.132/32] ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.797218 env[1190]: 2025-07-16 12:41:07.704 [INFO][3737] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec3ad697101 ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.797218 env[1190]: 2025-07-16 12:41:07.730 [INFO][3737] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.797218 env[1190]: 2025-07-16 12:41:07.731 [INFO][3737] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"bd76a2da-b5d5-4275-be7c-55ce3a01702a", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af", Pod:"goldmane-58fd7646b9-vg42f", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.99.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"caliec3ad697101", MAC:"46:b8:79:cd:70:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:07.797218 env[1190]: 2025-07-16 12:41:07.756 [INFO][3737] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af" Namespace="calico-system" Pod="goldmane-58fd7646b9-vg42f" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:07.856233 systemd-networkd[1024]: caliea0f480d039: Link UP Jul 16 12:41:07.862276 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea0f480d039: link becomes ready Jul 16 12:41:07.861550 systemd-networkd[1024]: caliea0f480d039: Gained carrier Jul 16 12:41:07.875252 systemd[1]: run-netns-cni\x2d30eccca0\x2d32e4\x2db779\x2d61bc\x2da74e5a4b0e99.mount: Deactivated successfully. Jul 16 12:41:07.885016 env[1190]: time="2025-07-16T12:41:07.884899164Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:07.885274 env[1190]: time="2025-07-16T12:41:07.885216748Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:07.885495 env[1190]: time="2025-07-16T12:41:07.885438057Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:07.886013 env[1190]: time="2025-07-16T12:41:07.885956136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af pid=3835 runtime=io.containerd.runc.v2 Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.516 [INFO][3750] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.570 [INFO][3750] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0 calico-apiserver-76cb86d967- calico-apiserver 5ac53c4c-94cf-444a-aa04-118dcd95f8bd 979 0 2025-07-16 12:40:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:76cb86d967 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com calico-apiserver-76cb86d967-4d62v eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliea0f480d039 [] [] }} ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.570 [INFO][3750] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.785 [INFO][3790] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" HandleID="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.787 [INFO][3790] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" HandleID="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003151f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-uobsc.gb1.brightbox.com", "pod":"calico-apiserver-76cb86d967-4d62v", "timestamp":"2025-07-16 12:41:07.785421295 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.787 [INFO][3790] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.787 [INFO][3790] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.787 [INFO][3790] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.807 [INFO][3790] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.815 [INFO][3790] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.821 [INFO][3790] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.824 [INFO][3790] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.827 [INFO][3790] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.827 [INFO][3790] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.830 [INFO][3790] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.837 [INFO][3790] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.849 [INFO][3790] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.133/26] block=192.168.99.128/26 handle="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.849 [INFO][3790] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.133/26] handle="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.850 [INFO][3790] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:07.910413 env[1190]: 2025-07-16 12:41:07.850 [INFO][3790] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.133/26] IPv6=[] ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" HandleID="k8s-pod-network.8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.912497 env[1190]: 2025-07-16 12:41:07.852 [INFO][3750] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ac53c4c-94cf-444a-aa04-118dcd95f8bd", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-76cb86d967-4d62v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea0f480d039", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:07.912497 env[1190]: 2025-07-16 12:41:07.852 [INFO][3750] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.133/32] ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.912497 env[1190]: 2025-07-16 12:41:07.852 [INFO][3750] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliea0f480d039 ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.912497 env[1190]: 2025-07-16 12:41:07.862 [INFO][3750] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.912497 env[1190]: 2025-07-16 12:41:07.863 [INFO][3750] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ac53c4c-94cf-444a-aa04-118dcd95f8bd", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c", Pod:"calico-apiserver-76cb86d967-4d62v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea0f480d039", MAC:"3e:f8:d6:86:7e:de", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:07.912497 env[1190]: 2025-07-16 12:41:07.907 [INFO][3750] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-4d62v" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:07.938585 systemd[1]: run-containerd-runc-k8s.io-1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af-runc.T0GTWr.mount: Deactivated successfully. Jul 16 12:41:07.948065 systemd[1]: Started cri-containerd-1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af.scope. Jul 16 12:41:07.971000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.971000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fd7a040 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:41:07.971000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:41:07.971000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.971000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009a69ec0 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:41:07.971000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:41:07.977000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526387 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.977000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009bad470 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:41:07.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:41:07.983000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526381 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.983000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009a69f50 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:41:07.983000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:41:07.998000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.998000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009c42210 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:41:07.998000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:41:07.998000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:07.998000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f390520 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:41:07.998000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.027000 audit: BPF prog-id=155 op=LOAD Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326633326261643839623437333532666634613136643330633165 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326633326261643839623437333532666634613136643330633165 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit: BPF prog-id=156 op=LOAD Jul 16 12:41:08.028000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c20a0 items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326633326261643839623437333532666634613136643330633165 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit: BPF prog-id=157 op=LOAD Jul 16 12:41:08.028000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c20e8 items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326633326261643839623437333532666634613136643330633165 Jul 16 12:41:08.028000 audit: BPF prog-id=157 op=UNLOAD Jul 16 12:41:08.028000 audit: BPF prog-id=156 op=UNLOAD Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { perfmon } for pid=3845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit[3845]: AVC avc: denied { bpf } for pid=3845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.028000 audit: BPF prog-id=158 op=LOAD Jul 16 12:41:08.028000 audit[3845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c24f8 items=0 ppid=3835 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326633326261643839623437333532666634613136643330633165 Jul 16 12:41:08.046791 env[1190]: time="2025-07-16T12:41:08.046061885Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:08.046791 env[1190]: time="2025-07-16T12:41:08.046111119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:08.046791 env[1190]: time="2025-07-16T12:41:08.046128572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:08.046791 env[1190]: time="2025-07-16T12:41:08.046327440Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c pid=3875 runtime=io.containerd.runc.v2 Jul 16 12:41:08.093034 systemd[1]: Started cri-containerd-8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c.scope. Jul 16 12:41:08.187272 systemd-networkd[1024]: cali56018e3b2a1: Link UP Jul 16 12:41:08.192371 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56018e3b2a1: link becomes ready Jul 16 12:41:08.192007 systemd-networkd[1024]: cali56018e3b2a1: Gained carrier Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:07.594 [INFO][3762] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:07.633 [INFO][3762] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0 coredns-7c65d6cfc9- kube-system f377f6d0-6e59-4b6f-943d-6b38f4839100 977 0 2025-07-16 12:40:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com coredns-7c65d6cfc9-8p4rf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali56018e3b2a1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:07.633 [INFO][3762] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:07.995 [INFO][3803] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" HandleID="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:07.998 [INFO][3803] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" HandleID="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f3b0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-uobsc.gb1.brightbox.com", "pod":"coredns-7c65d6cfc9-8p4rf", "timestamp":"2025-07-16 12:41:07.995428135 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.000 [INFO][3803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.000 [INFO][3803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.000 [INFO][3803] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.025 [INFO][3803] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.050 [INFO][3803] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.057 [INFO][3803] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.066 [INFO][3803] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.071 [INFO][3803] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.072 [INFO][3803] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.078 [INFO][3803] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428 Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.098 [INFO][3803] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.172 [INFO][3803] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.134/26] block=192.168.99.128/26 handle="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.172 [INFO][3803] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.134/26] handle="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.172 [INFO][3803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:08.226343 env[1190]: 2025-07-16 12:41:08.172 [INFO][3803] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.134/26] IPv6=[] ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" HandleID="k8s-pod-network.22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.229100 env[1190]: 2025-07-16 12:41:08.182 [INFO][3762] cni-plugin/k8s.go 418: Populated endpoint ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"f377f6d0-6e59-4b6f-943d-6b38f4839100", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7c65d6cfc9-8p4rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56018e3b2a1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:08.229100 env[1190]: 2025-07-16 12:41:08.183 [INFO][3762] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.134/32] ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.229100 env[1190]: 2025-07-16 12:41:08.183 [INFO][3762] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali56018e3b2a1 ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.229100 env[1190]: 2025-07-16 12:41:08.193 [INFO][3762] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.229100 env[1190]: 2025-07-16 12:41:08.194 [INFO][3762] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"f377f6d0-6e59-4b6f-943d-6b38f4839100", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428", Pod:"coredns-7c65d6cfc9-8p4rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56018e3b2a1", MAC:"7a:33:df:12:5c:9c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:08.229100 env[1190]: 2025-07-16 12:41:08.224 [INFO][3762] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428" Namespace="kube-system" Pod="coredns-7c65d6cfc9-8p4rf" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:08.265066 env[1190]: time="2025-07-16T12:41:08.264888467Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:08.265450 env[1190]: time="2025-07-16T12:41:08.265405164Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:08.265647 env[1190]: time="2025-07-16T12:41:08.265602769Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:08.266214 env[1190]: time="2025-07-16T12:41:08.265976033Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428 pid=3913 runtime=io.containerd.runc.v2 Jul 16 12:41:08.321482 systemd[1]: Started cri-containerd-22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428.scope. Jul 16 12:41:08.377538 kernel: kauditd_printk_skb: 386 callbacks suppressed Jul 16 12:41:08.377709 kernel: audit: type=1400 audit(1752669668.370:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.389307 kernel: audit: type=1400 audit(1752669668.370:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.389386 kernel: audit: type=1400 audit(1752669668.370:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.414950 kernel: audit: type=1400 audit(1752669668.370:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.429034 kernel: audit: type=1400 audit(1752669668.370:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.445056 kernel: audit: type=1400 audit(1752669668.370:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.450974 kernel: audit: type=1400 audit(1752669668.370:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.458884 kernel: audit: type=1400 audit(1752669668.370:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.465891 kernel: audit: type=1400 audit(1752669668.370:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.305 [INFO][3812] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.306 [INFO][3812] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" iface="eth0" netns="/var/run/netns/cni-d872c839-43e7-f140-f260-c35425886d40" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.307 [INFO][3812] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" iface="eth0" netns="/var/run/netns/cni-d872c839-43e7-f140-f260-c35425886d40" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.310 [INFO][3812] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" iface="eth0" netns="/var/run/netns/cni-d872c839-43e7-f140-f260-c35425886d40" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.310 [INFO][3812] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.310 [INFO][3812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.434 [INFO][3939] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.435 [INFO][3939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.435 [INFO][3939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.451 [WARNING][3939] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.451 [INFO][3939] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.453 [INFO][3939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:08.467608 env[1190]: 2025-07-16 12:41:08.460 [INFO][3812] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:08.468441 env[1190]: time="2025-07-16T12:41:08.467817690Z" level=info msg="TearDown network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" successfully" Jul 16 12:41:08.468441 env[1190]: time="2025-07-16T12:41:08.467888795Z" level=info msg="StopPodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" returns successfully" Jul 16 12:41:08.469033 env[1190]: time="2025-07-16T12:41:08.468996496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-th55w,Uid:ab651272-d47f-4948-b667-dab25752f7ab,Namespace:calico-apiserver,Attempt:1,}" Jul 16 12:41:08.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.476989 kernel: audit: type=1400 audit(1752669668.371:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.371000 audit: BPF prog-id=159 op=LOAD Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3913 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232373738623564313530356562303764393136643230363561346231 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3913 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232373738623564313530356562303764393136643230363561346231 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit: BPF prog-id=160 op=LOAD Jul 16 12:41:08.377000 audit[3925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020e890 items=0 ppid=3913 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232373738623564313530356562303764393136643230363561346231 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.377000 audit: BPF prog-id=161 op=LOAD Jul 16 12:41:08.377000 audit[3925]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020e8d8 items=0 ppid=3913 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232373738623564313530356562303764393136643230363561346231 Jul 16 12:41:08.377000 audit: BPF prog-id=161 op=UNLOAD Jul 16 12:41:08.378000 audit: BPF prog-id=160 op=UNLOAD Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { perfmon } for pid=3925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit[3925]: AVC avc: denied { bpf } for pid=3925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.378000 audit: BPF prog-id=162 op=LOAD Jul 16 12:41:08.378000 audit[3925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020ece8 items=0 ppid=3913 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232373738623564313530356562303764393136643230363561346231 Jul 16 12:41:08.538505 env[1190]: time="2025-07-16T12:41:08.538444135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-8p4rf,Uid:f377f6d0-6e59-4b6f-943d-6b38f4839100,Namespace:kube-system,Attempt:1,} returns sandbox id \"22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428\"" Jul 16 12:41:08.552761 env[1190]: time="2025-07-16T12:41:08.552708297Z" level=info msg="CreateContainer within sandbox \"22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 16 12:41:08.556000 audit[3953]: NETFILTER_CFG table=filter:103 family=2 entries=17 op=nft_register_rule pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:08.556000 audit[3953]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff19b57120 a2=0 a3=7fff19b5710c items=0 ppid=2128 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:08.573747 env[1190]: time="2025-07-16T12:41:08.573694674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-vg42f,Uid:bd76a2da-b5d5-4275-be7c-55ce3a01702a,Namespace:calico-system,Attempt:1,} returns sandbox id \"1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af\"" Jul 16 12:41:08.577798 env[1190]: time="2025-07-16T12:41:08.577758739Z" level=info msg="CreateContainer within sandbox \"22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a223008e11d352948f63c2bf0b2df73ea6167bac6f7aa4bbfb168b4285efb1e6\"" Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.580000 audit: BPF prog-id=163 op=LOAD Jul 16 12:41:08.583000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.583000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3875 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353361643264653661393035643561613766666362643839373130 Jul 16 12:41:08.583000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.583000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3875 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353361643264653661393035643561613766666362643839373130 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586013 env[1190]: time="2025-07-16T12:41:08.585972231Z" level=info msg="StartContainer for \"a223008e11d352948f63c2bf0b2df73ea6167bac6f7aa4bbfb168b4285efb1e6\"" Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.584000 audit: BPF prog-id=164 op=LOAD Jul 16 12:41:08.584000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003767b0 items=0 ppid=3875 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353361643264653661393035643561613766666362643839373130 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.586000 audit: BPF prog-id=165 op=LOAD Jul 16 12:41:08.586000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003767f8 items=0 ppid=3875 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353361643264653661393035643561613766666362643839373130 Jul 16 12:41:08.589000 audit: BPF prog-id=165 op=UNLOAD Jul 16 12:41:08.589000 audit: BPF prog-id=164 op=UNLOAD Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.590000 audit: BPF prog-id=166 op=LOAD Jul 16 12:41:08.590000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000376c08 items=0 ppid=3875 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865353361643264653661393035643561613766666362643839373130 Jul 16 12:41:08.613000 audit[3953]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:08.613000 audit[3953]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff19b57120 a2=0 a3=7fff19b5710c items=0 ppid=2128 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:08.634577 systemd[1]: Started cri-containerd-a223008e11d352948f63c2bf0b2df73ea6167bac6f7aa4bbfb168b4285efb1e6.scope. Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.683000 audit: BPF prog-id=167 op=LOAD Jul 16 12:41:08.685000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.685000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3913 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323330303865313164333532393438663633633262663062326466 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3913 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323330303865313164333532393438663633633262663062326466 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.686000 audit: BPF prog-id=168 op=LOAD Jul 16 12:41:08.686000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001ed7e0 items=0 ppid=3913 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323330303865313164333532393438663633633262663062326466 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.688000 audit: BPF prog-id=169 op=LOAD Jul 16 12:41:08.688000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001ed828 items=0 ppid=3913 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323330303865313164333532393438663633633262663062326466 Jul 16 12:41:08.699000 audit: BPF prog-id=169 op=UNLOAD Jul 16 12:41:08.699000 audit: BPF prog-id=168 op=UNLOAD Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:08.700000 audit: BPF prog-id=170 op=LOAD Jul 16 12:41:08.700000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001edc38 items=0 ppid=3913 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:08.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323330303865313164333532393438663633633262663062326466 Jul 16 12:41:08.737044 env[1190]: time="2025-07-16T12:41:08.736902560Z" level=info msg="StartContainer for \"a223008e11d352948f63c2bf0b2df73ea6167bac6f7aa4bbfb168b4285efb1e6\" returns successfully" Jul 16 12:41:08.791076 systemd-networkd[1024]: caliec3ad697101: Gained IPv6LL Jul 16 12:41:08.849000 audit[3999]: AVC avc: denied { getattr } for pid=3999 comm="coredns" path="cgroup:[4026532879]" dev="nsfs" ino=4026532879 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c578 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Jul 16 12:41:08.849000 audit[3999]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4fa8 a3=0 items=0 ppid=3913 pid=3999 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c578 key=(null) Jul 16 12:41:08.849000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Jul 16 12:41:08.878452 systemd[1]: run-netns-cni\x2dd872c839\x2d43e7\x2df140\x2df260\x2dc35425886d40.mount: Deactivated successfully. Jul 16 12:41:08.922005 systemd-networkd[1024]: caliea0f480d039: Gained IPv6LL Jul 16 12:41:08.985980 systemd-networkd[1024]: cali620d2270ca2: Link UP Jul 16 12:41:08.990971 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:41:08.991126 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali620d2270ca2: link becomes ready Jul 16 12:41:08.995601 systemd-networkd[1024]: cali620d2270ca2: Gained carrier Jul 16 12:41:09.014316 env[1190]: time="2025-07-16T12:41:09.014254378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-4d62v,Uid:5ac53c4c-94cf-444a-aa04-118dcd95f8bd,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c\"" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.675 [INFO][3956] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.720 [INFO][3956] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0 calico-apiserver-76cb86d967- calico-apiserver ab651272-d47f-4948-b667-dab25752f7ab 1001 0 2025-07-16 12:40:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:76cb86d967 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com calico-apiserver-76cb86d967-th55w eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali620d2270ca2 [] [] }} ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.721 [INFO][3956] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.826 [INFO][4015] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" HandleID="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.831 [INFO][4015] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" HandleID="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-uobsc.gb1.brightbox.com", "pod":"calico-apiserver-76cb86d967-th55w", "timestamp":"2025-07-16 12:41:08.825959625 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.831 [INFO][4015] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.831 [INFO][4015] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.831 [INFO][4015] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.842 [INFO][4015] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.852 [INFO][4015] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.859 [INFO][4015] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.862 [INFO][4015] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.868 [INFO][4015] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.868 [INFO][4015] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.877 [INFO][4015] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4 Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.905 [INFO][4015] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.961 [INFO][4015] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.135/26] block=192.168.99.128/26 handle="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.961 [INFO][4015] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.135/26] handle="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.962 [INFO][4015] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:09.048991 env[1190]: 2025-07-16 12:41:08.962 [INFO][4015] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.135/26] IPv6=[] ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" HandleID="k8s-pod-network.8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.050344 env[1190]: 2025-07-16 12:41:08.966 [INFO][3956] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab651272-d47f-4948-b667-dab25752f7ab", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-76cb86d967-th55w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali620d2270ca2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:09.050344 env[1190]: 2025-07-16 12:41:08.967 [INFO][3956] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.135/32] ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.050344 env[1190]: 2025-07-16 12:41:08.967 [INFO][3956] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali620d2270ca2 ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.050344 env[1190]: 2025-07-16 12:41:09.001 [INFO][3956] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.050344 env[1190]: 2025-07-16 12:41:09.004 [INFO][3956] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab651272-d47f-4948-b667-dab25752f7ab", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4", Pod:"calico-apiserver-76cb86d967-th55w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali620d2270ca2", MAC:"e2:1a:16:46:a1:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:09.050344 env[1190]: 2025-07-16 12:41:09.045 [INFO][3956] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4" Namespace="calico-apiserver" Pod="calico-apiserver-76cb86d967-th55w" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:09.069350 env[1190]: time="2025-07-16T12:41:09.069244828Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:09.069707 env[1190]: time="2025-07-16T12:41:09.069650183Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:09.070031 env[1190]: time="2025-07-16T12:41:09.069983267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:09.070437 env[1190]: time="2025-07-16T12:41:09.070386561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4 pid=4047 runtime=io.containerd.runc.v2 Jul 16 12:41:09.173382 systemd[1]: run-containerd-runc-k8s.io-8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4-runc.q565yc.mount: Deactivated successfully. Jul 16 12:41:09.181265 systemd[1]: Started cri-containerd-8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4.scope. Jul 16 12:41:09.201458 kubelet[1989]: I0716 12:41:09.197557 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-8p4rf" podStartSLOduration=51.197532583 podStartE2EDuration="51.197532583s" podCreationTimestamp="2025-07-16 12:40:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-16 12:41:09.195742692 +0000 UTC m=+56.927250256" watchObservedRunningTime="2025-07-16 12:41:09.197532583 +0000 UTC m=+56.929040120" Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.407000 audit: BPF prog-id=171 op=LOAD Jul 16 12:41:09.410000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.410000 audit[4058]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4047 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303638316335613066326537626135653438353235643139633863 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4047 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303638316335613066326537626135653438353235643139633863 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.411000 audit: BPF prog-id=172 op=LOAD Jul 16 12:41:09.411000 audit[4058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fed0 items=0 ppid=4047 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303638316335613066326537626135653438353235643139633863 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.412000 audit: BPF prog-id=173 op=LOAD Jul 16 12:41:09.412000 audit[4058]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032ff18 items=0 ppid=4047 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303638316335613066326537626135653438353235643139633863 Jul 16 12:41:09.412000 audit: BPF prog-id=173 op=UNLOAD Jul 16 12:41:09.412000 audit: BPF prog-id=172 op=UNLOAD Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { perfmon } for pid=4058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit[4058]: AVC avc: denied { bpf } for pid=4058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.413000 audit: BPF prog-id=174 op=LOAD Jul 16 12:41:09.413000 audit[4058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2328 items=0 ppid=4047 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303638316335613066326537626135653438353235643139633863 Jul 16 12:41:09.429000 audit[4076]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:09.429000 audit[4076]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffedf9e0960 a2=0 a3=7ffedf9e094c items=0 ppid=2128 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:09.438000 audit[4076]: NETFILTER_CFG table=nat:106 family=2 entries=44 op=nft_register_rule pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:09.438000 audit[4076]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffedf9e0960 a2=0 a3=7ffedf9e094c items=0 ppid=2128 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:09.502000 audit[4078]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:09.502000 audit[4078]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffea841be00 a2=0 a3=7ffea841bdec items=0 ppid=2128 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:09.540270 env[1190]: time="2025-07-16T12:41:09.540201549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76cb86d967-th55w,Uid:ab651272-d47f-4948-b667-dab25752f7ab,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4\"" Jul 16 12:41:09.619000 audit[4078]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:09.619000 audit[4078]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffea841be00 a2=0 a3=7ffea841bdec items=0 ppid=2128 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.909000 audit: BPF prog-id=175 op=LOAD Jul 16 12:41:09.909000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2f8defd0 a2=98 a3=1fffffffffffffff items=0 ppid=3457 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.909000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:09.910000 audit: BPF prog-id=175 op=UNLOAD Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit: BPF prog-id=176 op=LOAD Jul 16 12:41:09.911000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2f8deeb0 a2=94 a3=3 items=0 ppid=3457 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.911000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:09.911000 audit: BPF prog-id=176 op=UNLOAD Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit: BPF prog-id=177 op=LOAD Jul 16 12:41:09.911000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2f8deef0 a2=94 a3=7ffd2f8df0d0 items=0 ppid=3457 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.911000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:09.911000 audit: BPF prog-id=177 op=UNLOAD Jul 16 12:41:09.911000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.911000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd2f8defc0 a2=50 a3=a000000085 items=0 ppid=3457 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.911000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.916000 audit: BPF prog-id=178 op=LOAD Jul 16 12:41:09.916000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7ef39f80 a2=98 a3=3 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.916000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:09.916000 audit: BPF prog-id=178 op=UNLOAD Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit: BPF prog-id=179 op=LOAD Jul 16 12:41:09.917000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7ef39d70 a2=94 a3=54428f items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:09.917000 audit: BPF prog-id=179 op=UNLOAD Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:09.917000 audit: BPF prog-id=180 op=LOAD Jul 16 12:41:09.917000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7ef39da0 a2=94 a3=2 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:09.917000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:09.917000 audit: BPF prog-id=180 op=UNLOAD Jul 16 12:41:10.199425 systemd-networkd[1024]: cali56018e3b2a1: Gained IPv6LL Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.323000 audit: BPF prog-id=181 op=LOAD Jul 16 12:41:10.323000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7ef39c60 a2=94 a3=1 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.323000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.325000 audit: BPF prog-id=181 op=UNLOAD Jul 16 12:41:10.325000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.325000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7ef39d30 a2=50 a3=7fff7ef39e10 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.325000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.341000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.341000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7ef39c70 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.341000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.341000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.341000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7ef39ca0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.341000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.341000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.341000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7ef39bb0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.341000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.342000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.342000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7ef39cc0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.342000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.342000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7ef39ca0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.342000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.342000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7ef39c90 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.342000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.342000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7ef39cc0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.342000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.342000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7ef39ca0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.343000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7ef39cc0 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.343000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7ef39c90 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.343000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.343000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7ef39d00 a2=28 a3=0 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7ef39ab0 a2=50 a3=1 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit: BPF prog-id=182 op=LOAD Jul 16 12:41:10.344000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7ef39ab0 a2=94 a3=5 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.344000 audit: BPF prog-id=182 op=UNLOAD Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7ef39b60 a2=50 a3=1 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff7ef39c80 a2=4 a3=38 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.344000 audit[4137]: AVC avc: denied { confidentiality } for pid=4137 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:41:10.344000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7ef39cd0 a2=94 a3=6 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { confidentiality } for pid=4137 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:41:10.345000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7ef39480 a2=94 a3=88 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { perfmon } for pid=4137 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { bpf } for pid=4137 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.345000 audit[4137]: AVC avc: denied { confidentiality } for pid=4137 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:41:10.345000 audit[4137]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7ef39480 a2=94 a3=88 items=0 ppid=3457 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit: BPF prog-id=183 op=LOAD Jul 16 12:41:10.396000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd63051a40 a2=98 a3=1999999999999999 items=0 ppid=3457 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.396000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 16 12:41:10.396000 audit: BPF prog-id=183 op=UNLOAD Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.396000 audit: BPF prog-id=184 op=LOAD Jul 16 12:41:10.396000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd63051920 a2=94 a3=ffff items=0 ppid=3457 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.396000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 16 12:41:10.397000 audit: BPF prog-id=184 op=UNLOAD Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.397000 audit: BPF prog-id=185 op=LOAD Jul 16 12:41:10.397000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd63051960 a2=94 a3=7ffd63051b40 items=0 ppid=3457 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.397000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 16 12:41:10.397000 audit: BPF prog-id=185 op=UNLOAD Jul 16 12:41:10.574732 systemd-networkd[1024]: vxlan.calico: Link UP Jul 16 12:41:10.574746 systemd-networkd[1024]: vxlan.calico: Gained carrier Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.655000 audit: BPF prog-id=186 op=LOAD Jul 16 12:41:10.655000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0e869670 a2=98 a3=20 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.658000 audit: BPF prog-id=186 op=UNLOAD Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.659000 audit: BPF prog-id=187 op=LOAD Jul 16 12:41:10.659000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0e869480 a2=94 a3=54428f items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.659000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.660000 audit: BPF prog-id=187 op=UNLOAD Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.660000 audit: BPF prog-id=188 op=LOAD Jul 16 12:41:10.660000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0e8694b0 a2=94 a3=2 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.660000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.667000 audit: BPF prog-id=188 op=UNLOAD Jul 16 12:41:10.667000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.667000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0e869380 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.667000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0e8693b0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0e8692c0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0e8693d0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0e8693b0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0e8693a0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0e8693d0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0e8693b0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0e8693d0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0e8693a0 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.670000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.670000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0e869410 a2=28 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.672000 audit: BPF prog-id=189 op=LOAD Jul 16 12:41:10.672000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0e869280 a2=94 a3=0 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.672000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.672000 audit: BPF prog-id=189 op=UNLOAD Jul 16 12:41:10.714000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.714000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff0e869270 a2=50 a3=2800 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.714000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.714000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.714000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff0e869270 a2=50 a3=2800 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.714000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit: BPF prog-id=190 op=LOAD Jul 16 12:41:10.715000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0e868a90 a2=94 a3=2 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.715000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.715000 audit: BPF prog-id=190 op=UNLOAD Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.715000 audit: BPF prog-id=191 op=LOAD Jul 16 12:41:10.715000 audit[4168]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0e868b90 a2=94 a3=30 items=0 ppid=3457 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.715000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit: BPF prog-id=192 op=LOAD Jul 16 12:41:10.721000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe25edaa70 a2=98 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.721000 audit: BPF prog-id=192 op=UNLOAD Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit: BPF prog-id=193 op=LOAD Jul 16 12:41:10.721000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe25eda860 a2=94 a3=54428f items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.721000 audit: BPF prog-id=193 op=UNLOAD Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.721000 audit: BPF prog-id=194 op=LOAD Jul 16 12:41:10.721000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe25eda890 a2=94 a3=2 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.721000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.722000 audit: BPF prog-id=194 op=UNLOAD Jul 16 12:41:10.903673 systemd-networkd[1024]: cali620d2270ca2: Gained IPv6LL Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit: BPF prog-id=195 op=LOAD Jul 16 12:41:10.909000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe25eda750 a2=94 a3=1 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.909000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.909000 audit: BPF prog-id=195 op=UNLOAD Jul 16 12:41:10.909000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.909000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe25eda820 a2=50 a3=7ffe25eda900 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.909000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe25eda760 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe25eda790 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe25eda6a0 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe25eda7b0 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe25eda790 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe25eda780 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe25eda7b0 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe25eda790 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe25eda7b0 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe25eda780 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe25eda7f0 a2=28 a3=0 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe25eda5a0 a2=50 a3=1 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.922000 audit: BPF prog-id=196 op=LOAD Jul 16 12:41:10.922000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe25eda5a0 a2=94 a3=5 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.922000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.923000 audit: BPF prog-id=196 op=UNLOAD Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe25eda650 a2=50 a3=1 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.923000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe25eda770 a2=4 a3=38 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.923000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { confidentiality } for pid=4180 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:41:10.923000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe25eda7c0 a2=94 a3=6 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.923000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { confidentiality } for pid=4180 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:41:10.923000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe25ed9f70 a2=94 a3=88 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.923000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { perfmon } for pid=4180 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.923000 audit[4180]: AVC avc: denied { confidentiality } for pid=4180 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:41:10.923000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe25ed9f70 a2=94 a3=88 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.923000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.924000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.924000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe25edb9a0 a2=10 a3=f8f00800 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.924000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.925000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.925000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe25edb840 a2=10 a3=3 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.925000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.925000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe25edb7e0 a2=10 a3=3 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.925000 audit[4180]: AVC avc: denied { bpf } for pid=4180 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:10.925000 audit[4180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe25edb7e0 a2=10 a3=7 items=0 ppid=3457 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:10.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:41:10.934000 audit: BPF prog-id=191 op=UNLOAD Jul 16 12:41:11.190000 audit[4210]: NETFILTER_CFG table=nat:109 family=2 entries=15 op=nft_register_chain pid=4210 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:41:11.190000 audit[4210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeaca891d0 a2=0 a3=7ffeaca891bc items=0 ppid=3457 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:11.190000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:41:11.213000 audit[4213]: NETFILTER_CFG table=mangle:110 family=2 entries=16 op=nft_register_chain pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:41:11.213000 audit[4213]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffede410c30 a2=0 a3=7ffede410c1c items=0 ppid=3457 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:11.213000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:41:11.250000 audit[4211]: NETFILTER_CFG table=raw:111 family=2 entries=21 op=nft_register_chain pid=4211 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:41:11.250000 audit[4211]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe17692140 a2=0 a3=7ffe1769212c items=0 ppid=3457 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:11.250000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:41:11.255000 audit[4214]: NETFILTER_CFG table=filter:112 family=2 entries=299 op=nft_register_chain pid=4214 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:41:11.255000 audit[4214]: SYSCALL arch=c000003e syscall=46 success=yes exit=176796 a0=3 a1=7ffd7ad1e300 a2=0 a3=55c3dbedc000 items=0 ppid=3457 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:11.255000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:41:11.800286 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL Jul 16 12:41:12.028316 env[1190]: time="2025-07-16T12:41:12.028243069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:12.034790 env[1190]: time="2025-07-16T12:41:12.034719301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:761b294e26556b58aabc85094a3d465389e6b141b7400aee732bd13400a6124a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:12.037770 env[1190]: time="2025-07-16T12:41:12.037732725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:12.042126 env[1190]: time="2025-07-16T12:41:12.041470917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:5d3ecdec3cbbe8f7009077102e35e8a2141161b59c548cf3f97829177677cbce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:12.042299 env[1190]: time="2025-07-16T12:41:12.042177905Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\" returns image reference \"sha256:761b294e26556b58aabc85094a3d465389e6b141b7400aee732bd13400a6124a\"" Jul 16 12:41:12.075635 env[1190]: time="2025-07-16T12:41:12.074970034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\"" Jul 16 12:41:12.183981 env[1190]: time="2025-07-16T12:41:12.183914539Z" level=info msg="CreateContainer within sandbox \"c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 16 12:41:12.207647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2414557420.mount: Deactivated successfully. Jul 16 12:41:12.216711 env[1190]: time="2025-07-16T12:41:12.216667171Z" level=info msg="CreateContainer within sandbox \"c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a7e8e4345c5b95f10812e723a523fd77a4b34ca4690cffbe6e56a8243fea95a9\"" Jul 16 12:41:12.218681 env[1190]: time="2025-07-16T12:41:12.218636410Z" level=info msg="StartContainer for \"a7e8e4345c5b95f10812e723a523fd77a4b34ca4690cffbe6e56a8243fea95a9\"" Jul 16 12:41:12.260629 systemd[1]: Started cri-containerd-a7e8e4345c5b95f10812e723a523fd77a4b34ca4690cffbe6e56a8243fea95a9.scope. Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.291000 audit: BPF prog-id=197 op=LOAD Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3332 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:12.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653865343334356335623935663130383132653732336135323366 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=3332 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:12.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653865343334356335623935663130383132653732336135323366 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit: BPF prog-id=198 op=LOAD Jul 16 12:41:12.292000 audit[4234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003091b0 items=0 ppid=3332 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:12.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653865343334356335623935663130383132653732336135323366 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.292000 audit: BPF prog-id=199 op=LOAD Jul 16 12:41:12.292000 audit[4234]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003091f8 items=0 ppid=3332 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:12.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653865343334356335623935663130383132653732336135323366 Jul 16 12:41:12.293000 audit: BPF prog-id=199 op=UNLOAD Jul 16 12:41:12.293000 audit: BPF prog-id=198 op=UNLOAD Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:12.293000 audit: BPF prog-id=200 op=LOAD Jul 16 12:41:12.293000 audit[4234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000309608 items=0 ppid=3332 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:12.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137653865343334356335623935663130383132653732336135323366 Jul 16 12:41:12.341626 env[1190]: time="2025-07-16T12:41:12.340225750Z" level=info msg="StartContainer for \"a7e8e4345c5b95f10812e723a523fd77a4b34ca4690cffbe6e56a8243fea95a9\" returns successfully" Jul 16 12:41:12.699366 env[1190]: time="2025-07-16T12:41:12.699293056Z" level=info msg="StopPodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\"" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:12.873 [WARNING][4280] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ac53c4c-94cf-444a-aa04-118dcd95f8bd", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c", Pod:"calico-apiserver-76cb86d967-4d62v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea0f480d039", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:12.874 [INFO][4280] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:12.874 [INFO][4280] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" iface="eth0" netns="" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:12.874 [INFO][4280] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:12.875 [INFO][4280] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.121 [INFO][4287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.123 [INFO][4287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.124 [INFO][4287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.164 [WARNING][4287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.164 [INFO][4287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.168 [INFO][4287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:13.178355 env[1190]: 2025-07-16 12:41:13.175 [INFO][4280] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.178355 env[1190]: time="2025-07-16T12:41:13.178059620Z" level=info msg="TearDown network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" successfully" Jul 16 12:41:13.178355 env[1190]: time="2025-07-16T12:41:13.178099040Z" level=info msg="StopPodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" returns successfully" Jul 16 12:41:13.241312 env[1190]: time="2025-07-16T12:41:13.240734841Z" level=info msg="RemovePodSandbox for \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\"" Jul 16 12:41:13.241312 env[1190]: time="2025-07-16T12:41:13.240797068Z" level=info msg="Forcibly stopping sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\"" Jul 16 12:41:13.287501 kubelet[1989]: I0716 12:41:13.284776 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-b8ffdbb55-r2nnz" podStartSLOduration=31.60485382 podStartE2EDuration="38.273107801s" podCreationTimestamp="2025-07-16 12:40:35 +0000 UTC" firstStartedPulling="2025-07-16 12:41:05.386117848 +0000 UTC m=+53.117625380" lastFinishedPulling="2025-07-16 12:41:12.054371779 +0000 UTC m=+59.785879361" observedRunningTime="2025-07-16 12:41:13.265697766 +0000 UTC m=+60.997205334" watchObservedRunningTime="2025-07-16 12:41:13.273107801 +0000 UTC m=+61.004615344" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.347 [WARNING][4309] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ac53c4c-94cf-444a-aa04-118dcd95f8bd", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c", Pod:"calico-apiserver-76cb86d967-4d62v", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea0f480d039", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.347 [INFO][4309] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.347 [INFO][4309] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" iface="eth0" netns="" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.347 [INFO][4309] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.347 [INFO][4309] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.444 [INFO][4326] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.445 [INFO][4326] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.445 [INFO][4326] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.460 [WARNING][4326] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.460 [INFO][4326] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" HandleID="k8s-pod-network.af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--4d62v-eth0" Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.462 [INFO][4326] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:13.470706 env[1190]: 2025-07-16 12:41:13.466 [INFO][4309] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be" Jul 16 12:41:13.470706 env[1190]: time="2025-07-16T12:41:13.469961803Z" level=info msg="TearDown network for sandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" successfully" Jul 16 12:41:13.482397 env[1190]: time="2025-07-16T12:41:13.482301934Z" level=info msg="RemovePodSandbox \"af91ccde6e3e54337735103876788ac3c973c550392aa0fd012d0ee446d8f2be\" returns successfully" Jul 16 12:41:13.489556 env[1190]: time="2025-07-16T12:41:13.489498540Z" level=info msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.602 [WARNING][4345] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.602 [INFO][4345] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.602 [INFO][4345] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" iface="eth0" netns="" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.602 [INFO][4345] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.602 [INFO][4345] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.665 [INFO][4352] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.666 [INFO][4352] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.666 [INFO][4352] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.676 [WARNING][4352] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.676 [INFO][4352] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.678 [INFO][4352] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:13.682542 env[1190]: 2025-07-16 12:41:13.680 [INFO][4345] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.683711 env[1190]: time="2025-07-16T12:41:13.682575887Z" level=info msg="TearDown network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" successfully" Jul 16 12:41:13.683711 env[1190]: time="2025-07-16T12:41:13.682620931Z" level=info msg="StopPodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" returns successfully" Jul 16 12:41:13.683711 env[1190]: time="2025-07-16T12:41:13.683591785Z" level=info msg="RemovePodSandbox for \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" Jul 16 12:41:13.683711 env[1190]: time="2025-07-16T12:41:13.683634818Z" level=info msg="Forcibly stopping sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\"" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.779 [WARNING][4368] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.779 [INFO][4368] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.779 [INFO][4368] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" iface="eth0" netns="" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.779 [INFO][4368] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.779 [INFO][4368] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.815 [INFO][4375] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.816 [INFO][4375] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.816 [INFO][4375] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.827 [WARNING][4375] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.827 [INFO][4375] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" HandleID="k8s-pod-network.732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Workload="srv--uobsc.gb1.brightbox.com-k8s-whisker--6457d7ddc7--4pl58-eth0" Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.829 [INFO][4375] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:13.835765 env[1190]: 2025-07-16 12:41:13.831 [INFO][4368] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8" Jul 16 12:41:13.835765 env[1190]: time="2025-07-16T12:41:13.833992472Z" level=info msg="TearDown network for sandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" successfully" Jul 16 12:41:13.838514 env[1190]: time="2025-07-16T12:41:13.838442026Z" level=info msg="RemovePodSandbox \"732175711e6c9e4aa6090721cb6b6eff4d4d8267f9c162b00440f0dc066248e8\" returns successfully" Jul 16 12:41:13.839503 env[1190]: time="2025-07-16T12:41:13.839467459Z" level=info msg="StopPodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\"" Jul 16 12:41:13.882891 env[1190]: time="2025-07-16T12:41:13.882815994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:13.888167 env[1190]: time="2025-07-16T12:41:13.888132517Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb8f512acf9402730da120a7b0d47d3d9d451b56e6e5eb8bad53ab24f926f954,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:13.891389 env[1190]: time="2025-07-16T12:41:13.891354030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:13.896263 env[1190]: time="2025-07-16T12:41:13.896228308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:31346d4524252a3b0d2a1d289c4985b8402b498b5ce82a12e682096ab7446678,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:13.898454 env[1190]: time="2025-07-16T12:41:13.897541030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\" returns image reference \"sha256:eb8f512acf9402730da120a7b0d47d3d9d451b56e6e5eb8bad53ab24f926f954\"" Jul 16 12:41:13.900488 env[1190]: time="2025-07-16T12:41:13.900455188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\"" Jul 16 12:41:13.909177 env[1190]: time="2025-07-16T12:41:13.909137042Z" level=info msg="CreateContainer within sandbox \"a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Jul 16 12:41:13.941620 env[1190]: time="2025-07-16T12:41:13.941563885Z" level=info msg="CreateContainer within sandbox \"a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"cd58e7ce216b90418912705e7cf3d2512aa1d2f52421f7a014f5cb6d44583af1\"" Jul 16 12:41:13.944804 env[1190]: time="2025-07-16T12:41:13.944765962Z" level=info msg="StartContainer for \"cd58e7ce216b90418912705e7cf3d2512aa1d2f52421f7a014f5cb6d44583af1\"" Jul 16 12:41:14.010488 systemd[1]: Started cri-containerd-cd58e7ce216b90418912705e7cf3d2512aa1d2f52421f7a014f5cb6d44583af1.scope. Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:13.922 [WARNING][4390] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0", GenerateName:"calico-kube-controllers-b8ffdbb55-", Namespace:"calico-system", SelfLink:"", UID:"54e0dfc0-c0f4-400a-af04-d690a81a54ff", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b8ffdbb55", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9", Pod:"calico-kube-controllers-b8ffdbb55-r2nnz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6685da824e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:13.922 [INFO][4390] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:13.922 [INFO][4390] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" iface="eth0" netns="" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:13.922 [INFO][4390] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:13.922 [INFO][4390] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.027 [INFO][4397] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.031 [INFO][4397] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.031 [INFO][4397] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.040 [WARNING][4397] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.040 [INFO][4397] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.043 [INFO][4397] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.048762 env[1190]: 2025-07-16 12:41:14.046 [INFO][4390] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.048762 env[1190]: time="2025-07-16T12:41:14.048629509Z" level=info msg="TearDown network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" successfully" Jul 16 12:41:14.048762 env[1190]: time="2025-07-16T12:41:14.048667691Z" level=info msg="StopPodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" returns successfully" Jul 16 12:41:14.051435 env[1190]: time="2025-07-16T12:41:14.051397771Z" level=info msg="RemovePodSandbox for \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\"" Jul 16 12:41:14.051540 env[1190]: time="2025-07-16T12:41:14.051449248Z" level=info msg="Forcibly stopping sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\"" Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.061447 kernel: kauditd_printk_skb: 818 callbacks suppressed Jul 16 12:41:14.063125 kernel: audit: type=1400 audit(1752669674.058:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.070681 kernel: audit: type=1400 audit(1752669674.058:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076711 kernel: audit: type=1400 audit(1752669674.058:1326): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076789 kernel: audit: type=1400 audit(1752669674.058:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.081024 kernel: audit: type=1400 audit(1752669674.058:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090844 kernel: audit: type=1400 audit(1752669674.058:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.104939 kernel: audit: type=1400 audit(1752669674.058:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.105105 kernel: audit: type=1400 audit(1752669674.058:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.105173 kernel: audit: type=1400 audit(1752669674.058:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.111647 kernel: audit: type=1400 audit(1752669674.058:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.058000 audit: BPF prog-id=201 op=LOAD Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3535 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:14.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353865376365323136623930343138393132373035653763663364 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3535 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:14.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353865376365323136623930343138393132373035653763663364 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.063000 audit: BPF prog-id=202 op=LOAD Jul 16 12:41:14.063000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00016de00 items=0 ppid=3535 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:14.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353865376365323136623930343138393132373035653763663364 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.076000 audit: BPF prog-id=203 op=LOAD Jul 16 12:41:14.076000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00016de48 items=0 ppid=3535 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:14.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353865376365323136623930343138393132373035653763663364 Jul 16 12:41:14.090000 audit: BPF prog-id=203 op=UNLOAD Jul 16 12:41:14.090000 audit: BPF prog-id=202 op=UNLOAD Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:14.090000 audit: BPF prog-id=204 op=LOAD Jul 16 12:41:14.090000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00019a258 items=0 ppid=3535 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:14.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364353865376365323136623930343138393132373035653763663364 Jul 16 12:41:14.192408 env[1190]: time="2025-07-16T12:41:14.190096716Z" level=info msg="StartContainer for \"cd58e7ce216b90418912705e7cf3d2512aa1d2f52421f7a014f5cb6d44583af1\" returns successfully" Jul 16 12:41:14.250000 audit[4422]: AVC avc: denied { search } for pid=4422 comm="nginx" name="crypto" dev="proc" ino=34326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c133,c368 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 16 12:41:14.250000 audit[4422]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc32135a728 a2=0 a3=0 items=0 ppid=3535 pid=4422 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c133,c368 key=(null) Jul 16 12:41:14.250000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.172 [WARNING][4437] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0", GenerateName:"calico-kube-controllers-b8ffdbb55-", Namespace:"calico-system", SelfLink:"", UID:"54e0dfc0-c0f4-400a-af04-d690a81a54ff", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b8ffdbb55", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"c1bb54070363671184af6f03182d3deaccb364b7df3e22d5486e739a922170c9", Pod:"calico-kube-controllers-b8ffdbb55-r2nnz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6685da824e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.172 [INFO][4437] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.172 [INFO][4437] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" iface="eth0" netns="" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.172 [INFO][4437] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.172 [INFO][4437] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.235 [INFO][4445] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.235 [INFO][4445] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.235 [INFO][4445] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.245 [WARNING][4445] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.245 [INFO][4445] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" HandleID="k8s-pod-network.6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--kube--controllers--b8ffdbb55--r2nnz-eth0" Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.247 [INFO][4445] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.253023 env[1190]: 2025-07-16 12:41:14.249 [INFO][4437] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943" Jul 16 12:41:14.253023 env[1190]: time="2025-07-16T12:41:14.252138510Z" level=info msg="TearDown network for sandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" successfully" Jul 16 12:41:14.258320 env[1190]: time="2025-07-16T12:41:14.258284005Z" level=info msg="RemovePodSandbox \"6a8694b2d81857e0c0e80d339ba9a9a20f24a82e2419faba83418439bf311943\" returns successfully" Jul 16 12:41:14.259381 env[1190]: time="2025-07-16T12:41:14.259346540Z" level=info msg="StopPodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\"" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.316 [WARNING][4471] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"086a2a1b-2088-4be5-9c77-b637306b93da", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c", Pod:"coredns-7c65d6cfc9-97lv7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie618396647f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.316 [INFO][4471] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.317 [INFO][4471] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" iface="eth0" netns="" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.317 [INFO][4471] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.317 [INFO][4471] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.352 [INFO][4478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.352 [INFO][4478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.353 [INFO][4478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.364 [WARNING][4478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.364 [INFO][4478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.366 [INFO][4478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.371270 env[1190]: 2025-07-16 12:41:14.369 [INFO][4471] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.372341 env[1190]: time="2025-07-16T12:41:14.371314231Z" level=info msg="TearDown network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" successfully" Jul 16 12:41:14.372341 env[1190]: time="2025-07-16T12:41:14.371359230Z" level=info msg="StopPodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" returns successfully" Jul 16 12:41:14.373516 env[1190]: time="2025-07-16T12:41:14.373479711Z" level=info msg="RemovePodSandbox for \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\"" Jul 16 12:41:14.373730 env[1190]: time="2025-07-16T12:41:14.373673876Z" level=info msg="Forcibly stopping sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\"" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.429 [WARNING][4492] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"086a2a1b-2088-4be5-9c77-b637306b93da", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"2f4a9703e946ac57f837e1fc2beb17482cb41f610fd1d2235135f4c64f0c418c", Pod:"coredns-7c65d6cfc9-97lv7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie618396647f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.432 [INFO][4492] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.432 [INFO][4492] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" iface="eth0" netns="" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.432 [INFO][4492] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.432 [INFO][4492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.468 [INFO][4499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.468 [INFO][4499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.469 [INFO][4499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.478 [WARNING][4499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.478 [INFO][4499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" HandleID="k8s-pod-network.49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--97lv7-eth0" Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.480 [INFO][4499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.484897 env[1190]: 2025-07-16 12:41:14.482 [INFO][4492] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1" Jul 16 12:41:14.486254 env[1190]: time="2025-07-16T12:41:14.484927454Z" level=info msg="TearDown network for sandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" successfully" Jul 16 12:41:14.488642 env[1190]: time="2025-07-16T12:41:14.488587469Z" level=info msg="RemovePodSandbox \"49e878c4c876b16526f07fe545c272658c925787009f6b567b9754391c4e03e1\" returns successfully" Jul 16 12:41:14.489312 env[1190]: time="2025-07-16T12:41:14.489275840Z" level=info msg="StopPodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\"" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.550 [WARNING][4514] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"f377f6d0-6e59-4b6f-943d-6b38f4839100", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428", Pod:"coredns-7c65d6cfc9-8p4rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56018e3b2a1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.551 [INFO][4514] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.551 [INFO][4514] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" iface="eth0" netns="" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.551 [INFO][4514] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.551 [INFO][4514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.586 [INFO][4521] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.588 [INFO][4521] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.588 [INFO][4521] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.596 [WARNING][4521] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.597 [INFO][4521] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.598 [INFO][4521] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.605526 env[1190]: 2025-07-16 12:41:14.600 [INFO][4514] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.606768 env[1190]: time="2025-07-16T12:41:14.606717242Z" level=info msg="TearDown network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" successfully" Jul 16 12:41:14.607048 env[1190]: time="2025-07-16T12:41:14.607013333Z" level=info msg="StopPodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" returns successfully" Jul 16 12:41:14.607714 env[1190]: time="2025-07-16T12:41:14.607673026Z" level=info msg="RemovePodSandbox for \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\"" Jul 16 12:41:14.607808 env[1190]: time="2025-07-16T12:41:14.607719610Z" level=info msg="Forcibly stopping sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\"" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.668 [WARNING][4535] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"f377f6d0-6e59-4b6f-943d-6b38f4839100", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"22778b5d1505eb07d916d2065a4b13b1ed3c319b416363d1b4b426bfbcf50428", Pod:"coredns-7c65d6cfc9-8p4rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56018e3b2a1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.669 [INFO][4535] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.669 [INFO][4535] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" iface="eth0" netns="" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.669 [INFO][4535] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.669 [INFO][4535] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.715 [INFO][4542] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.715 [INFO][4542] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.715 [INFO][4542] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.724 [WARNING][4542] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.724 [INFO][4542] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" HandleID="k8s-pod-network.d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Workload="srv--uobsc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--8p4rf-eth0" Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.726 [INFO][4542] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.730985 env[1190]: 2025-07-16 12:41:14.728 [INFO][4535] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6" Jul 16 12:41:14.733024 env[1190]: time="2025-07-16T12:41:14.730959704Z" level=info msg="TearDown network for sandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" successfully" Jul 16 12:41:14.738081 env[1190]: time="2025-07-16T12:41:14.738035305Z" level=info msg="RemovePodSandbox \"d575c07aecb74aeb4a52d5d2910ebacb541006b24fcb1a15be926565ec5017f6\" returns successfully" Jul 16 12:41:14.738903 env[1190]: time="2025-07-16T12:41:14.738838676Z" level=info msg="StopPodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\"" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.793 [WARNING][4557] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"bd76a2da-b5d5-4275-be7c-55ce3a01702a", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af", Pod:"goldmane-58fd7646b9-vg42f", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.99.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"caliec3ad697101", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.794 [INFO][4557] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.794 [INFO][4557] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" iface="eth0" netns="" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.794 [INFO][4557] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.794 [INFO][4557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.844 [INFO][4564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.844 [INFO][4564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.844 [INFO][4564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.856 [WARNING][4564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.856 [INFO][4564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.858 [INFO][4564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.862491 env[1190]: 2025-07-16 12:41:14.860 [INFO][4557] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.863689 env[1190]: time="2025-07-16T12:41:14.862528447Z" level=info msg="TearDown network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" successfully" Jul 16 12:41:14.863689 env[1190]: time="2025-07-16T12:41:14.862583007Z" level=info msg="StopPodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" returns successfully" Jul 16 12:41:14.864112 env[1190]: time="2025-07-16T12:41:14.864074856Z" level=info msg="RemovePodSandbox for \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\"" Jul 16 12:41:14.866052 env[1190]: time="2025-07-16T12:41:14.865854833Z" level=info msg="Forcibly stopping sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\"" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.931 [WARNING][4579] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"bd76a2da-b5d5-4275-be7c-55ce3a01702a", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af", Pod:"goldmane-58fd7646b9-vg42f", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.99.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"caliec3ad697101", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.932 [INFO][4579] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.932 [INFO][4579] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" iface="eth0" netns="" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.932 [INFO][4579] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.932 [INFO][4579] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.968 [INFO][4586] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.968 [INFO][4586] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.969 [INFO][4586] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.978 [WARNING][4586] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.978 [INFO][4586] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" HandleID="k8s-pod-network.4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Workload="srv--uobsc.gb1.brightbox.com-k8s-goldmane--58fd7646b9--vg42f-eth0" Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.981 [INFO][4586] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:14.984816 env[1190]: 2025-07-16 12:41:14.982 [INFO][4579] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97" Jul 16 12:41:14.985763 env[1190]: time="2025-07-16T12:41:14.985708870Z" level=info msg="TearDown network for sandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" successfully" Jul 16 12:41:15.050809 env[1190]: time="2025-07-16T12:41:15.050719683Z" level=info msg="RemovePodSandbox \"4a4355693b6ef18f397ef08a2b557a6dfec08faa3a4e8515b9d1ea3459e84b97\" returns successfully" Jul 16 12:41:15.052840 env[1190]: time="2025-07-16T12:41:15.052772266Z" level=info msg="StopPodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\"" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.137 [WARNING][4602] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab651272-d47f-4948-b667-dab25752f7ab", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4", Pod:"calico-apiserver-76cb86d967-th55w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali620d2270ca2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.137 [INFO][4602] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.137 [INFO][4602] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" iface="eth0" netns="" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.138 [INFO][4602] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.138 [INFO][4602] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.176 [INFO][4609] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.177 [INFO][4609] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.177 [INFO][4609] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.186 [WARNING][4609] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.186 [INFO][4609] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.189 [INFO][4609] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:15.193716 env[1190]: 2025-07-16 12:41:15.191 [INFO][4602] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.195451 env[1190]: time="2025-07-16T12:41:15.194667900Z" level=info msg="TearDown network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" successfully" Jul 16 12:41:15.195451 env[1190]: time="2025-07-16T12:41:15.194722429Z" level=info msg="StopPodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" returns successfully" Jul 16 12:41:15.195595 env[1190]: time="2025-07-16T12:41:15.195565987Z" level=info msg="RemovePodSandbox for \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\"" Jul 16 12:41:15.195660 env[1190]: time="2025-07-16T12:41:15.195611947Z" level=info msg="Forcibly stopping sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\"" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.264 [WARNING][4624] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0", GenerateName:"calico-apiserver-76cb86d967-", Namespace:"calico-apiserver", SelfLink:"", UID:"ab651272-d47f-4948-b667-dab25752f7ab", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76cb86d967", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4", Pod:"calico-apiserver-76cb86d967-th55w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali620d2270ca2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.265 [INFO][4624] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.265 [INFO][4624] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" iface="eth0" netns="" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.265 [INFO][4624] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.265 [INFO][4624] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.304 [INFO][4631] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.304 [INFO][4631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.304 [INFO][4631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.313 [WARNING][4631] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.313 [INFO][4631] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" HandleID="k8s-pod-network.0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Workload="srv--uobsc.gb1.brightbox.com-k8s-calico--apiserver--76cb86d967--th55w-eth0" Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.315 [INFO][4631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:15.319765 env[1190]: 2025-07-16 12:41:15.317 [INFO][4624] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356" Jul 16 12:41:15.320904 env[1190]: time="2025-07-16T12:41:15.320826813Z" level=info msg="TearDown network for sandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" successfully" Jul 16 12:41:15.325289 env[1190]: time="2025-07-16T12:41:15.325230317Z" level=info msg="RemovePodSandbox \"0c295d978f0d4722defe034f93aef84410a3ac70c6b6501bea38a35f15d8d356\" returns successfully" Jul 16 12:41:15.928000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:15.928000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002406fe0 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:41:15.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:41:15.929000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:15.929000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002407000 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:41:15.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:41:15.931000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:15.931000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002407020 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:41:15.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:41:15.936000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:41:15.936000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016de480 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:41:15.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:41:16.615083 env[1190]: time="2025-07-16T12:41:16.615006433Z" level=info msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.779 [INFO][4656] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.780 [INFO][4656] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" iface="eth0" netns="/var/run/netns/cni-9cd0d368-26cb-9bad-4ff6-8fd808171f6c" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.781 [INFO][4656] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" iface="eth0" netns="/var/run/netns/cni-9cd0d368-26cb-9bad-4ff6-8fd808171f6c" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.785 [INFO][4656] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" iface="eth0" netns="/var/run/netns/cni-9cd0d368-26cb-9bad-4ff6-8fd808171f6c" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.785 [INFO][4656] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.785 [INFO][4656] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.870 [INFO][4663] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.871 [INFO][4663] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.871 [INFO][4663] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.881 [WARNING][4663] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.882 [INFO][4663] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.885 [INFO][4663] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:16.891707 env[1190]: 2025-07-16 12:41:16.888 [INFO][4656] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:41:16.901002 env[1190]: time="2025-07-16T12:41:16.897307328Z" level=info msg="TearDown network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" successfully" Jul 16 12:41:16.901002 env[1190]: time="2025-07-16T12:41:16.897418506Z" level=info msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" returns successfully" Jul 16 12:41:16.897606 systemd[1]: run-netns-cni\x2d9cd0d368\x2d26cb\x2d9bad\x2d4ff6\x2d8fd808171f6c.mount: Deactivated successfully. Jul 16 12:41:16.903848 env[1190]: time="2025-07-16T12:41:16.902384967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t9nvt,Uid:c89dbd0e-d645-4beb-a0eb-e54f765fb87a,Namespace:calico-system,Attempt:1,}" Jul 16 12:41:17.174690 systemd-networkd[1024]: cali3f6d89f3a5f: Link UP Jul 16 12:41:17.181222 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:41:17.181386 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3f6d89f3a5f: link becomes ready Jul 16 12:41:17.182083 systemd-networkd[1024]: cali3f6d89f3a5f: Gained carrier Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.002 [INFO][4669] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0 csi-node-driver- calico-system c89dbd0e-d645-4beb-a0eb-e54f765fb87a 1053 0 2025-07-16 12:40:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-uobsc.gb1.brightbox.com csi-node-driver-t9nvt eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3f6d89f3a5f [] [] }} ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.003 [INFO][4669] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.070 [INFO][4682] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" HandleID="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.070 [INFO][4682] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" HandleID="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d56a0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-uobsc.gb1.brightbox.com", "pod":"csi-node-driver-t9nvt", "timestamp":"2025-07-16 12:41:17.07049176 +0000 UTC"}, Hostname:"srv-uobsc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.071 [INFO][4682] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.071 [INFO][4682] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.071 [INFO][4682] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-uobsc.gb1.brightbox.com' Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.088 [INFO][4682] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.102 [INFO][4682] ipam/ipam.go 394: Looking up existing affinities for host host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.113 [INFO][4682] ipam/ipam.go 511: Trying affinity for 192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.116 [INFO][4682] ipam/ipam.go 158: Attempting to load block cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.122 [INFO][4682] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.99.128/26 host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.122 [INFO][4682] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.99.128/26 handle="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.126 [INFO][4682] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932 Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.133 [INFO][4682] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.99.128/26 handle="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.147 [INFO][4682] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.99.136/26] block=192.168.99.128/26 handle="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.147 [INFO][4682] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.99.136/26] handle="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" host="srv-uobsc.gb1.brightbox.com" Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.147 [INFO][4682] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:17.223908 env[1190]: 2025-07-16 12:41:17.148 [INFO][4682] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.99.136/26] IPv6=[] ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" HandleID="k8s-pod-network.1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.226205 env[1190]: 2025-07-16 12:41:17.151 [INFO][4669] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89dbd0e-d645-4beb-a0eb-e54f765fb87a", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-t9nvt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6d89f3a5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:17.226205 env[1190]: 2025-07-16 12:41:17.151 [INFO][4669] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.99.136/32] ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.226205 env[1190]: 2025-07-16 12:41:17.151 [INFO][4669] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3f6d89f3a5f ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.226205 env[1190]: 2025-07-16 12:41:17.185 [INFO][4669] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.226205 env[1190]: 2025-07-16 12:41:17.186 [INFO][4669] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89dbd0e-d645-4beb-a0eb-e54f765fb87a", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932", Pod:"csi-node-driver-t9nvt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6d89f3a5f", MAC:"4a:57:e2:4e:d7:9f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:17.226205 env[1190]: 2025-07-16 12:41:17.217 [INFO][4669] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932" Namespace="calico-system" Pod="csi-node-driver-t9nvt" WorkloadEndpoint="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:41:17.278000 audit[4699]: NETFILTER_CFG table=filter:113 family=2 entries=48 op=nft_register_chain pid=4699 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:41:17.278000 audit[4699]: SYSCALL arch=c000003e syscall=46 success=yes exit=23108 a0=3 a1=7ffc98114100 a2=0 a3=7ffc981140ec items=0 ppid=3457 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:17.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:41:17.301375 env[1190]: time="2025-07-16T12:41:17.284001704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:17.301375 env[1190]: time="2025-07-16T12:41:17.284144145Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:17.301375 env[1190]: time="2025-07-16T12:41:17.284197425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:17.301375 env[1190]: time="2025-07-16T12:41:17.284477398Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932 pid=4707 runtime=io.containerd.runc.v2 Jul 16 12:41:17.316550 systemd[1]: Started cri-containerd-1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932.scope. Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.381000 audit: BPF prog-id=205 op=LOAD Jul 16 12:41:17.391000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.391000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4707 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:17.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666432366364363736353534613262326533393862323634333766 Jul 16 12:41:17.396000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.396000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4707 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:17.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666432366364363736353534613262326533393862323634333766 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.397000 audit: BPF prog-id=206 op=LOAD Jul 16 12:41:17.397000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035a940 items=0 ppid=4707 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:17.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666432366364363736353534613262326533393862323634333766 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.398000 audit: BPF prog-id=207 op=LOAD Jul 16 12:41:17.398000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035a988 items=0 ppid=4707 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:17.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666432366364363736353534613262326533393862323634333766 Jul 16 12:41:17.399000 audit: BPF prog-id=207 op=UNLOAD Jul 16 12:41:17.399000 audit: BPF prog-id=206 op=UNLOAD Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:17.401000 audit: BPF prog-id=208 op=LOAD Jul 16 12:41:17.401000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035ad98 items=0 ppid=4707 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:17.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666432366364363736353534613262326533393862323634333766 Jul 16 12:41:17.501779 env[1190]: time="2025-07-16T12:41:17.499149669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t9nvt,Uid:c89dbd0e-d645-4beb-a0eb-e54f765fb87a,Namespace:calico-system,Attempt:1,} returns sandbox id \"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932\"" Jul 16 12:41:18.227027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1802460861.mount: Deactivated successfully. Jul 16 12:41:18.583143 systemd-networkd[1024]: cali3f6d89f3a5f: Gained IPv6LL Jul 16 12:41:19.804707 env[1190]: time="2025-07-16T12:41:19.803982534Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:19.806982 env[1190]: time="2025-07-16T12:41:19.806430515Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dc4ea8b409b85d2f118bb4677ad3d34b57e7b01d488c9f019f7073bb58b2162b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:19.809831 env[1190]: time="2025-07-16T12:41:19.809200827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:19.812076 env[1190]: time="2025-07-16T12:41:19.812038809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:a2b761fd93d824431ad93e59e8e670cdf00b478f4b532145297e1e67f2768305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:19.813236 env[1190]: time="2025-07-16T12:41:19.813195465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\" returns image reference \"sha256:dc4ea8b409b85d2f118bb4677ad3d34b57e7b01d488c9f019f7073bb58b2162b\"" Jul 16 12:41:19.828926 env[1190]: time="2025-07-16T12:41:19.828883310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 16 12:41:19.919147 systemd[1]: run-containerd-runc-k8s.io-a7e8e4345c5b95f10812e723a523fd77a4b34ca4690cffbe6e56a8243fea95a9-runc.SagqD9.mount: Deactivated successfully. Jul 16 12:41:19.949376 env[1190]: time="2025-07-16T12:41:19.949317476Z" level=info msg="CreateContainer within sandbox \"1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Jul 16 12:41:19.978251 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2805527863.mount: Deactivated successfully. Jul 16 12:41:19.986283 env[1190]: time="2025-07-16T12:41:19.986229094Z" level=info msg="CreateContainer within sandbox \"1c2f32bad89b47352ff4a16d30c1e28d43d2080553a0f48bed7c9b8d4537a5af\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89\"" Jul 16 12:41:19.987947 env[1190]: time="2025-07-16T12:41:19.987805228Z" level=info msg="StartContainer for \"d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89\"" Jul 16 12:41:20.031612 systemd[1]: Started cri-containerd-d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89.scope. Jul 16 12:41:20.075671 kernel: kauditd_printk_skb: 122 callbacks suppressed Jul 16 12:41:20.080796 kernel: audit: type=1400 audit(1752669680.068:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.081631 kernel: audit: type=1400 audit(1752669680.068:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.088915 kernel: audit: type=1400 audit(1752669680.069:1368): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.089278 kernel: audit: type=1400 audit(1752669680.069:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.104061 kernel: audit: type=1400 audit(1752669680.069:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.104150 kernel: audit: type=1400 audit(1752669680.069:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.113355 kernel: audit: type=1400 audit(1752669680.069:1372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.113530 kernel: audit: type=1400 audit(1752669680.069:1373): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.122062 kernel: audit: type=1400 audit(1752669680.069:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.127289 kernel: audit: type=1400 audit(1752669680.074:1375): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit: BPF prog-id=209 op=LOAD Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3835 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633538383366316636373738383761313932656439333561363734 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3835 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633538383366316636373738383761313932656439333561363734 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.074000 audit: BPF prog-id=210 op=LOAD Jul 16 12:41:20.074000 audit[4768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003007f0 items=0 ppid=3835 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633538383366316636373738383761313932656439333561363734 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit: BPF prog-id=211 op=LOAD Jul 16 12:41:20.079000 audit[4768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000300838 items=0 ppid=3835 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633538383366316636373738383761313932656439333561363734 Jul 16 12:41:20.079000 audit: BPF prog-id=211 op=UNLOAD Jul 16 12:41:20.079000 audit: BPF prog-id=210 op=UNLOAD Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { perfmon } for pid=4768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit[4768]: AVC avc: denied { bpf } for pid=4768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:20.079000 audit: BPF prog-id=212 op=LOAD Jul 16 12:41:20.079000 audit[4768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000300c48 items=0 ppid=3835 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436633538383366316636373738383761313932656439333561363734 Jul 16 12:41:20.155129 env[1190]: time="2025-07-16T12:41:20.154710391Z" level=info msg="StartContainer for \"d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89\" returns successfully" Jul 16 12:41:20.540409 kubelet[1989]: I0716 12:41:20.540233 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-58fd7646b9-vg42f" podStartSLOduration=35.303987893 podStartE2EDuration="46.537786454s" podCreationTimestamp="2025-07-16 12:40:34 +0000 UTC" firstStartedPulling="2025-07-16 12:41:08.590119782 +0000 UTC m=+56.321627319" lastFinishedPulling="2025-07-16 12:41:19.823918296 +0000 UTC m=+67.555425880" observedRunningTime="2025-07-16 12:41:20.535958869 +0000 UTC m=+68.267466423" watchObservedRunningTime="2025-07-16 12:41:20.537786454 +0000 UTC m=+68.269293990" Jul 16 12:41:20.625000 audit[4823]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=4823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:20.625000 audit[4823]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc9894a8f0 a2=0 a3=7ffc9894a8dc items=0 ppid=2128 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:20.630000 audit[4823]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:20.630000 audit[4823]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc9894a8f0 a2=0 a3=7ffc9894a8dc items=0 ppid=2128 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:20.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:21.371585 systemd[1]: run-containerd-runc-k8s.io-d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89-runc.whzBq3.mount: Deactivated successfully. Jul 16 12:41:21.551461 systemd[1]: run-containerd-runc-k8s.io-d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89-runc.0k3ukI.mount: Deactivated successfully. Jul 16 12:41:24.445454 env[1190]: time="2025-07-16T12:41:24.445313447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.448129 env[1190]: time="2025-07-16T12:41:24.448094088Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.450079 env[1190]: time="2025-07-16T12:41:24.450043659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.451763 env[1190]: time="2025-07-16T12:41:24.451727321Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.452700 env[1190]: time="2025-07-16T12:41:24.452655101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Jul 16 12:41:24.457316 env[1190]: time="2025-07-16T12:41:24.457251455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 16 12:41:24.467368 env[1190]: time="2025-07-16T12:41:24.467319159Z" level=info msg="CreateContainer within sandbox \"8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 16 12:41:24.491570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2827165260.mount: Deactivated successfully. Jul 16 12:41:24.498371 env[1190]: time="2025-07-16T12:41:24.498241464Z" level=info msg="CreateContainer within sandbox \"8e53ad2de6a905d5aa7ffcbd89710c90cbbd10eb9786487a47501ae371ca6d0c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1f1bea171fac80dcf69d680c132fe9560f02d2e55fcf519eef69718d241ac809\"" Jul 16 12:41:24.500716 env[1190]: time="2025-07-16T12:41:24.500594764Z" level=info msg="StartContainer for \"1f1bea171fac80dcf69d680c132fe9560f02d2e55fcf519eef69718d241ac809\"" Jul 16 12:41:24.558321 systemd[1]: run-containerd-runc-k8s.io-1f1bea171fac80dcf69d680c132fe9560f02d2e55fcf519eef69718d241ac809-runc.SnnGTE.mount: Deactivated successfully. Jul 16 12:41:24.572247 systemd[1]: Started cri-containerd-1f1bea171fac80dcf69d680c132fe9560f02d2e55fcf519eef69718d241ac809.scope. Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.596000 audit: BPF prog-id=213 op=LOAD Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3875 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166316265613137316661633830646366363964363830633133326665 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3875 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166316265613137316661633830646366363964363830633133326665 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit: BPF prog-id=214 op=LOAD Jul 16 12:41:24.601000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000318460 items=0 ppid=3875 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166316265613137316661633830646366363964363830633133326665 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit: BPF prog-id=215 op=LOAD Jul 16 12:41:24.601000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003184a8 items=0 ppid=3875 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166316265613137316661633830646366363964363830633133326665 Jul 16 12:41:24.601000 audit: BPF prog-id=215 op=UNLOAD Jul 16 12:41:24.601000 audit: BPF prog-id=214 op=UNLOAD Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.601000 audit: BPF prog-id=216 op=LOAD Jul 16 12:41:24.601000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003188b8 items=0 ppid=3875 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166316265613137316661633830646366363964363830633133326665 Jul 16 12:41:24.670226 env[1190]: time="2025-07-16T12:41:24.670043302Z" level=info msg="StartContainer for \"1f1bea171fac80dcf69d680c132fe9560f02d2e55fcf519eef69718d241ac809\" returns successfully" Jul 16 12:41:24.866098 env[1190]: time="2025-07-16T12:41:24.866047291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.868155 env[1190]: time="2025-07-16T12:41:24.868115676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.870522 env[1190]: time="2025-07-16T12:41:24.870475432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.872759 env[1190]: time="2025-07-16T12:41:24.872723744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:24.873817 env[1190]: time="2025-07-16T12:41:24.873753507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Jul 16 12:41:24.877972 env[1190]: time="2025-07-16T12:41:24.877856702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\"" Jul 16 12:41:24.881625 env[1190]: time="2025-07-16T12:41:24.881586650Z" level=info msg="CreateContainer within sandbox \"8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 16 12:41:24.893833 env[1190]: time="2025-07-16T12:41:24.893788887Z" level=info msg="CreateContainer within sandbox \"8e0681c5a0f2e7ba5e48525d19c8c5d84146067deff26efd6971f097279e2cf4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2908f168879c39406078f1b32d164fbfd0ba12ebde6a9c3d3cd7aca4ec0a3be9\"" Jul 16 12:41:24.894951 env[1190]: time="2025-07-16T12:41:24.894916523Z" level=info msg="StartContainer for \"2908f168879c39406078f1b32d164fbfd0ba12ebde6a9c3d3cd7aca4ec0a3be9\"" Jul 16 12:41:24.927410 systemd[1]: Started cri-containerd-2908f168879c39406078f1b32d164fbfd0ba12ebde6a9c3d3cd7aca4ec0a3be9.scope. Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.979000 audit: BPF prog-id=217 op=LOAD Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4047 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303866313638383739633339343036303738663162333264313634 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4047 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303866313638383739633339343036303738663162333264313634 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.987000 audit: BPF prog-id=218 op=LOAD Jul 16 12:41:24.987000 audit[4922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a6060 items=0 ppid=4047 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303866313638383739633339343036303738663162333264313634 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit: BPF prog-id=219 op=LOAD Jul 16 12:41:24.988000 audit[4922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a60a8 items=0 ppid=4047 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303866313638383739633339343036303738663162333264313634 Jul 16 12:41:24.988000 audit: BPF prog-id=219 op=UNLOAD Jul 16 12:41:24.988000 audit: BPF prog-id=218 op=UNLOAD Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:24.988000 audit: BPF prog-id=220 op=LOAD Jul 16 12:41:24.988000 audit[4922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a64b8 items=0 ppid=4047 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:24.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303866313638383739633339343036303738663162333264313634 Jul 16 12:41:25.057327 env[1190]: time="2025-07-16T12:41:25.056538814Z" level=info msg="StartContainer for \"2908f168879c39406078f1b32d164fbfd0ba12ebde6a9c3d3cd7aca4ec0a3be9\" returns successfully" Jul 16 12:41:25.370605 kubelet[1989]: I0716 12:41:25.370401 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-76cb86d967-4d62v" podStartSLOduration=39.933860105 podStartE2EDuration="55.370319318s" podCreationTimestamp="2025-07-16 12:40:30 +0000 UTC" firstStartedPulling="2025-07-16 12:41:09.018037557 +0000 UTC m=+56.749545088" lastFinishedPulling="2025-07-16 12:41:24.454496762 +0000 UTC m=+72.186004301" observedRunningTime="2025-07-16 12:41:25.366573796 +0000 UTC m=+73.098081352" watchObservedRunningTime="2025-07-16 12:41:25.370319318 +0000 UTC m=+73.101826854" Jul 16 12:41:25.399954 kubelet[1989]: I0716 12:41:25.399853 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-76cb86d967-th55w" podStartSLOduration=40.066735515 podStartE2EDuration="55.399832862s" podCreationTimestamp="2025-07-16 12:40:30 +0000 UTC" firstStartedPulling="2025-07-16 12:41:09.543229443 +0000 UTC m=+57.274736975" lastFinishedPulling="2025-07-16 12:41:24.876326778 +0000 UTC m=+72.607834322" observedRunningTime="2025-07-16 12:41:25.398357861 +0000 UTC m=+73.129865422" watchObservedRunningTime="2025-07-16 12:41:25.399832862 +0000 UTC m=+73.131340406" Jul 16 12:41:25.440000 audit[4956]: NETFILTER_CFG table=filter:116 family=2 entries=14 op=nft_register_rule pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.443768 kernel: kauditd_printk_skb: 167 callbacks suppressed Jul 16 12:41:25.443961 kernel: audit: type=1325 audit(1752669685.440:1422): table=filter:116 family=2 entries=14 op=nft_register_rule pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.440000 audit[4956]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdfb764a60 a2=0 a3=7ffdfb764a4c items=0 ppid=2128 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.456888 kernel: audit: type=1300 audit(1752669685.440:1422): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdfb764a60 a2=0 a3=7ffdfb764a4c items=0 ppid=2128 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:25.461903 kernel: audit: type=1327 audit(1752669685.440:1422): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:25.464000 audit[4956]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.464000 audit[4956]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdfb764a60 a2=0 a3=7ffdfb764a4c items=0 ppid=2128 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.477703 kernel: audit: type=1325 audit(1752669685.464:1423): table=nat:117 family=2 entries=20 op=nft_register_rule pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.477813 kernel: audit: type=1300 audit(1752669685.464:1423): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdfb764a60 a2=0 a3=7ffdfb764a4c items=0 ppid=2128 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.477893 kernel: audit: type=1327 audit(1752669685.464:1423): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:25.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:25.506000 audit[4958]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.506000 audit[4958]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcc8310520 a2=0 a3=7ffcc831050c items=0 ppid=2128 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.519424 kernel: audit: type=1325 audit(1752669685.506:1424): table=filter:118 family=2 entries=14 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.519537 kernel: audit: type=1300 audit(1752669685.506:1424): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcc8310520 a2=0 a3=7ffcc831050c items=0 ppid=2128 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:25.525885 kernel: audit: type=1327 audit(1752669685.506:1424): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:25.521000 audit[4958]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.521000 audit[4958]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcc8310520 a2=0 a3=7ffcc831050c items=0 ppid=2128 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:25.548463 kernel: audit: type=1325 audit(1752669685.521:1425): table=nat:119 family=2 entries=20 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:25.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:27.018000 audit[4893]: AVC avc: denied { watch } for pid=4893 comm="apiserver" path="/calico-apiserver-certs/..2025_07_16_12_40_51.3444307921/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c709 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c709 tclass=file permissive=0 Jul 16 12:41:27.018000 audit[4893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0026b6220 a2=fc6 a3=0 items=0 ppid=3875 pid=4893 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c709 key=(null) Jul 16 12:41:27.018000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 16 12:41:27.417279 kubelet[1989]: I0716 12:41:27.416809 1989 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 16 12:41:27.462000 audit[4962]: NETFILTER_CFG table=filter:120 family=2 entries=13 op=nft_register_rule pid=4962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:27.462000 audit[4962]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffea8f3a6f0 a2=0 a3=7ffea8f3a6dc items=0 ppid=2128 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:27.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:27.468000 audit[4962]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:27.468000 audit[4962]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffea8f3a6f0 a2=0 a3=7ffea8f3a6dc items=0 ppid=2128 pid=4962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:27.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:28.977101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2603933906.mount: Deactivated successfully. Jul 16 12:41:29.001050 env[1190]: time="2025-07-16T12:41:29.000691096Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:29.006933 env[1190]: time="2025-07-16T12:41:29.006708151Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6ba7e39edcd8be6d32dfccbfdb65533a727b14a19173515e91607d4259f8ee7f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:29.011940 env[1190]: time="2025-07-16T12:41:29.011005532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:29.013117 env[1190]: time="2025-07-16T12:41:29.013053581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:fbf7f21f5aba95930803ad7e7dea8b083220854eae72c2a7c51681c09c5614b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:29.014260 env[1190]: time="2025-07-16T12:41:29.014105424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\" returns image reference \"sha256:6ba7e39edcd8be6d32dfccbfdb65533a727b14a19173515e91607d4259f8ee7f\"" Jul 16 12:41:29.023034 env[1190]: time="2025-07-16T12:41:29.022936466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 16 12:41:29.036307 env[1190]: time="2025-07-16T12:41:29.034502502Z" level=info msg="CreateContainer within sandbox \"a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Jul 16 12:41:29.073520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3500490482.mount: Deactivated successfully. Jul 16 12:41:29.085532 env[1190]: time="2025-07-16T12:41:29.085462673Z" level=info msg="CreateContainer within sandbox \"a2e1cf399fd2acfbbef61ab560bbae97e1e4931a56356872123ef72ee3b28ce5\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"01af044e76a2f44e39ff6d040eb238cd96962d706f376def1b1e148e101466b7\"" Jul 16 12:41:29.087364 env[1190]: time="2025-07-16T12:41:29.087294303Z" level=info msg="StartContainer for \"01af044e76a2f44e39ff6d040eb238cd96962d706f376def1b1e148e101466b7\"" Jul 16 12:41:29.230848 systemd[1]: Started cri-containerd-01af044e76a2f44e39ff6d040eb238cd96962d706f376def1b1e148e101466b7.scope. Jul 16 12:41:29.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.282000 audit: BPF prog-id=221 op=LOAD Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3535 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616630343465373661326634346533396666366430343065623233 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3535 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616630343465373661326634346533396666366430343065623233 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.284000 audit: BPF prog-id=222 op=LOAD Jul 16 12:41:29.284000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00029abb0 items=0 ppid=3535 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616630343465373661326634346533396666366430343065623233 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.285000 audit: BPF prog-id=223 op=LOAD Jul 16 12:41:29.285000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00029abf8 items=0 ppid=3535 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616630343465373661326634346533396666366430343065623233 Jul 16 12:41:29.286000 audit: BPF prog-id=223 op=UNLOAD Jul 16 12:41:29.286000 audit: BPF prog-id=222 op=UNLOAD Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:29.286000 audit: BPF prog-id=224 op=LOAD Jul 16 12:41:29.286000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00029b008 items=0 ppid=3535 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616630343465373661326634346533396666366430343065623233 Jul 16 12:41:29.348715 env[1190]: time="2025-07-16T12:41:29.348635866Z" level=info msg="StartContainer for \"01af044e76a2f44e39ff6d040eb238cd96962d706f376def1b1e148e101466b7\" returns successfully" Jul 16 12:41:29.584000 audit[5005]: NETFILTER_CFG table=filter:122 family=2 entries=11 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:29.584000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffda8b82140 a2=0 a3=7ffda8b8212c items=0 ppid=2128 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:29.598000 audit[5005]: NETFILTER_CFG table=nat:123 family=2 entries=29 op=nft_register_chain pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:29.598000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffda8b82140 a2=0 a3=7ffda8b8212c items=0 ppid=2128 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:29.635000 audit[4933]: AVC avc: denied { watch } for pid=4933 comm="apiserver" path="/calico-apiserver-certs/..2025_07_16_12_40_51.3635090627/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c159,c616 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c159,c616 tclass=file permissive=0 Jul 16 12:41:29.635000 audit[4933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ea5080 a2=fc6 a3=0 items=0 ppid=4047 pid=4933 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c159,c616 key=(null) Jul 16 12:41:29.635000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 16 12:41:29.671938 kubelet[1989]: I0716 12:41:29.671786 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-588f74d5c5-kqjrk" podStartSLOduration=2.354453482 podStartE2EDuration="24.670582572s" podCreationTimestamp="2025-07-16 12:41:05 +0000 UTC" firstStartedPulling="2025-07-16 12:41:06.705245335 +0000 UTC m=+54.436752867" lastFinishedPulling="2025-07-16 12:41:29.021374395 +0000 UTC m=+76.752881957" observedRunningTime="2025-07-16 12:41:29.506335982 +0000 UTC m=+77.237843521" watchObservedRunningTime="2025-07-16 12:41:29.670582572 +0000 UTC m=+77.402090114" Jul 16 12:41:29.711000 audit[5007]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:29.711000 audit[5007]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff5f29d6a0 a2=0 a3=7fff5f29d68c items=0 ppid=2128 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:29.718000 audit[5007]: NETFILTER_CFG table=nat:125 family=2 entries=36 op=nft_register_chain pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:29.718000 audit[5007]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7fff5f29d6a0 a2=0 a3=7fff5f29d68c items=0 ppid=2128 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:29.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:32.059173 env[1190]: time="2025-07-16T12:41:32.059039719Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:32.062058 env[1190]: time="2025-07-16T12:41:32.062002000Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:32.065230 env[1190]: time="2025-07-16T12:41:32.065182584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:32.068242 env[1190]: time="2025-07-16T12:41:32.068198261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:32.069303 env[1190]: time="2025-07-16T12:41:32.069253831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 16 12:41:32.080746 env[1190]: time="2025-07-16T12:41:32.080692210Z" level=info msg="CreateContainer within sandbox \"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 16 12:41:32.104444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4096792177.mount: Deactivated successfully. Jul 16 12:41:32.110937 env[1190]: time="2025-07-16T12:41:32.110767374Z" level=info msg="CreateContainer within sandbox \"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"946bd631b462affd2a6614a19380ce165614486d5669c07382ddee7468a20597\"" Jul 16 12:41:32.112902 env[1190]: time="2025-07-16T12:41:32.112077384Z" level=info msg="StartContainer for \"946bd631b462affd2a6614a19380ce165614486d5669c07382ddee7468a20597\"" Jul 16 12:41:32.161101 systemd[1]: Started cri-containerd-946bd631b462affd2a6614a19380ce165614486d5669c07382ddee7468a20597.scope. Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.232367 kernel: kauditd_printk_skb: 83 callbacks suppressed Jul 16 12:41:32.237214 kernel: audit: type=1400 audit(1752669692.226:1452): avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.252619 kernel: audit: type=1300 audit(1752669692.226:1452): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fceb616a7a8 items=0 ppid=4707 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:32.252722 kernel: audit: type=1327 audit(1752669692.226:1452): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934366264363331623436326166666432613636313461313933383063 Jul 16 12:41:32.226000 audit[5021]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fceb616a7a8 items=0 ppid=4707 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:32.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934366264363331623436326166666432613636313461313933383063 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.260398 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.260505 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.275936 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.282041 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.290557 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.300080 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.311918 kernel: audit: type=1400 audit(1752669692.226:1453): avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.226000 audit: BPF prog-id=225 op=LOAD Jul 16 12:41:32.226000 audit[5021]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022a6f8 items=0 ppid=4707 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:32.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934366264363331623436326166666432613636313461313933383063 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.236000 audit: BPF prog-id=226 op=LOAD Jul 16 12:41:32.236000 audit[5021]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022a748 items=0 ppid=4707 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:32.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934366264363331623436326166666432613636313461313933383063 Jul 16 12:41:32.253000 audit: BPF prog-id=226 op=UNLOAD Jul 16 12:41:32.253000 audit: BPF prog-id=225 op=UNLOAD Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:32.253000 audit: BPF prog-id=227 op=LOAD Jul 16 12:41:32.253000 audit[5021]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022a7d8 items=0 ppid=4707 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:32.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934366264363331623436326166666432613636313461313933383063 Jul 16 12:41:32.350499 env[1190]: time="2025-07-16T12:41:32.348908991Z" level=info msg="StartContainer for \"946bd631b462affd2a6614a19380ce165614486d5669c07382ddee7468a20597\" returns successfully" Jul 16 12:41:32.355169 env[1190]: time="2025-07-16T12:41:32.354846301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 16 12:41:34.715955 env[1190]: time="2025-07-16T12:41:34.715379478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:34.717859 env[1190]: time="2025-07-16T12:41:34.717790943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:34.720333 env[1190]: time="2025-07-16T12:41:34.720285236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:34.722466 env[1190]: time="2025-07-16T12:41:34.722416270Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:34.723473 env[1190]: time="2025-07-16T12:41:34.723409545Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 16 12:41:34.730754 env[1190]: time="2025-07-16T12:41:34.730681608Z" level=info msg="CreateContainer within sandbox \"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 16 12:41:34.759181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount568929061.mount: Deactivated successfully. Jul 16 12:41:34.768517 env[1190]: time="2025-07-16T12:41:34.768445741Z" level=info msg="CreateContainer within sandbox \"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9fac9d3263c91597022d2ef2011da40e57500c6a047642f962af2c5c5ef062c6\"" Jul 16 12:41:34.769691 env[1190]: time="2025-07-16T12:41:34.769652722Z" level=info msg="StartContainer for \"9fac9d3263c91597022d2ef2011da40e57500c6a047642f962af2c5c5ef062c6\"" Jul 16 12:41:34.847302 systemd[1]: run-containerd-runc-k8s.io-9fac9d3263c91597022d2ef2011da40e57500c6a047642f962af2c5c5ef062c6-runc.Jsn1Ls.mount: Deactivated successfully. Jul 16 12:41:34.860081 systemd[1]: Started cri-containerd-9fac9d3263c91597022d2ef2011da40e57500c6a047642f962af2c5c5ef062c6.scope. Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6fe83392e8 items=0 ppid=4707 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:34.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616339643332363363393135393730323264326566323031316461 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.903000 audit: BPF prog-id=228 op=LOAD Jul 16 12:41:34.903000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002efe28 items=0 ppid=4707 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:34.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616339643332363363393135393730323264326566323031316461 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit: BPF prog-id=229 op=LOAD Jul 16 12:41:34.905000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002efe78 items=0 ppid=4707 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:34.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616339643332363363393135393730323264326566323031316461 Jul 16 12:41:34.905000 audit: BPF prog-id=229 op=UNLOAD Jul 16 12:41:34.905000 audit: BPF prog-id=228 op=UNLOAD Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { perfmon } for pid=5057 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit[5057]: AVC avc: denied { bpf } for pid=5057 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:34.905000 audit: BPF prog-id=230 op=LOAD Jul 16 12:41:34.905000 audit[5057]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002eff08 items=0 ppid=4707 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:34.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616339643332363363393135393730323264326566323031316461 Jul 16 12:41:34.937025 env[1190]: time="2025-07-16T12:41:34.936967692Z" level=info msg="StartContainer for \"9fac9d3263c91597022d2ef2011da40e57500c6a047642f962af2c5c5ef062c6\" returns successfully" Jul 16 12:41:35.518986 kubelet[1989]: I0716 12:41:35.518713 1989 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-t9nvt" podStartSLOduration=43.304774719 podStartE2EDuration="1m0.517415008s" podCreationTimestamp="2025-07-16 12:40:35 +0000 UTC" firstStartedPulling="2025-07-16 12:41:17.512500934 +0000 UTC m=+65.244008470" lastFinishedPulling="2025-07-16 12:41:34.725141227 +0000 UTC m=+82.456648759" observedRunningTime="2025-07-16 12:41:35.513190516 +0000 UTC m=+83.244698065" watchObservedRunningTime="2025-07-16 12:41:35.517415008 +0000 UTC m=+83.248922552" Jul 16 12:41:35.897305 kubelet[1989]: I0716 12:41:35.895917 1989 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 16 12:41:35.903572 kubelet[1989]: I0716 12:41:35.903534 1989 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 16 12:41:37.111685 systemd[1]: run-containerd-runc-k8s.io-464ef8c79b89ff1e3ffee464a66cfee4d7c1fe909fcd1d93bbf56ee4a010480f-runc.ehx1NN.mount: Deactivated successfully. Jul 16 12:41:37.986962 systemd[1]: Started sshd@9-10.230.12.146:22-147.75.109.163:57484.service. Jul 16 12:41:38.011032 kernel: kauditd_printk_skb: 76 callbacks suppressed Jul 16 12:41:38.013470 kernel: audit: type=1130 audit(1752669697.987:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.12.146:22-147.75.109.163:57484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:37.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.12.146:22-147.75.109.163:57484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:38.997676 sshd[5116]: Accepted publickey for core from 147.75.109.163 port 57484 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:38.996000 audit[5116]: USER_ACCT pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.004939 kernel: audit: type=1101 audit(1752669698.996:1465): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.004000 audit[5116]: CRED_ACQ pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.016536 kernel: audit: type=1103 audit(1752669699.004:1466): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.016652 kernel: audit: type=1006 audit(1752669699.004:1467): pid=5116 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 16 12:41:39.016715 kernel: audit: type=1300 audit(1752669699.004:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7afdbcb0 a2=3 a3=0 items=0 ppid=1 pid=5116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:39.004000 audit[5116]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7afdbcb0 a2=3 a3=0 items=0 ppid=1 pid=5116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:39.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:39.026316 kernel: audit: type=1327 audit(1752669699.004:1467): proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:39.026963 sshd[5116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:39.065335 systemd[1]: Started session-10.scope. Jul 16 12:41:39.066436 systemd-logind[1180]: New session 10 of user core. Jul 16 12:41:39.081000 audit[5116]: USER_START pid=5116 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.088000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.096979 kernel: audit: type=1105 audit(1752669699.081:1468): pid=5116 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:39.097780 kernel: audit: type=1103 audit(1752669699.088:1469): pid=5120 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:40.392478 sshd[5116]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:40.409069 kernel: audit: type=1106 audit(1752669700.399:1470): pid=5116 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:40.409945 kernel: audit: type=1104 audit(1752669700.399:1471): pid=5116 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:40.399000 audit[5116]: USER_END pid=5116 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:40.399000 audit[5116]: CRED_DISP pid=5116 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:40.403963 systemd[1]: sshd@9-10.230.12.146:22-147.75.109.163:57484.service: Deactivated successfully. Jul 16 12:41:40.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.12.146:22-147.75.109.163:57484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:40.407515 systemd[1]: session-10.scope: Deactivated successfully. Jul 16 12:41:40.415643 systemd-logind[1180]: Session 10 logged out. Waiting for processes to exit. Jul 16 12:41:40.420407 systemd-logind[1180]: Removed session 10. Jul 16 12:41:45.566549 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 16 12:41:45.568162 kernel: audit: type=1130 audit(1752669705.555:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.12.146:22-147.75.109.163:40908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:45.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.12.146:22-147.75.109.163:40908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:45.555798 systemd[1]: Started sshd@10-10.230.12.146:22-147.75.109.163:40908.service. Jul 16 12:41:46.536000 audit[5150]: USER_ACCT pid=5150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.542801 sshd[5150]: Accepted publickey for core from 147.75.109.163 port 40908 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:46.547902 kernel: audit: type=1101 audit(1752669706.536:1474): pid=5150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.548000 audit[5150]: CRED_ACQ pid=5150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.575847 kernel: audit: type=1103 audit(1752669706.548:1475): pid=5150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.576054 kernel: audit: type=1006 audit(1752669706.549:1476): pid=5150 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 16 12:41:46.576127 kernel: audit: type=1300 audit(1752669706.549:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7b7971e0 a2=3 a3=0 items=0 ppid=1 pid=5150 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:46.549000 audit[5150]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7b7971e0 a2=3 a3=0 items=0 ppid=1 pid=5150 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:46.582821 kernel: audit: type=1327 audit(1752669706.549:1476): proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:46.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:46.576759 sshd[5150]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:46.596399 systemd-logind[1180]: New session 11 of user core. Jul 16 12:41:46.599729 systemd[1]: Started session-11.scope. Jul 16 12:41:46.626353 kernel: audit: type=1105 audit(1752669706.616:1477): pid=5150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.616000 audit[5150]: USER_START pid=5150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.625000 audit[5152]: CRED_ACQ pid=5152 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:46.633976 kernel: audit: type=1103 audit(1752669706.625:1478): pid=5152 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:47.719595 sshd[5150]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:47.724000 audit[5150]: USER_END pid=5150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:47.725000 audit[5150]: CRED_DISP pid=5150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:47.740207 kernel: audit: type=1106 audit(1752669707.724:1479): pid=5150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:47.740996 kernel: audit: type=1104 audit(1752669707.725:1480): pid=5150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:47.743302 systemd[1]: sshd@10-10.230.12.146:22-147.75.109.163:40908.service: Deactivated successfully. Jul 16 12:41:47.745896 systemd[1]: session-11.scope: Deactivated successfully. Jul 16 12:41:47.747135 systemd-logind[1180]: Session 11 logged out. Waiting for processes to exit. Jul 16 12:41:47.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.12.146:22-147.75.109.163:40908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:47.751242 systemd-logind[1180]: Removed session 11. Jul 16 12:41:51.390914 systemd[1]: run-containerd-runc-k8s.io-d6c5883f1f677887a192ed935a674c6f4bedf676082e47bff85cb0cf3e1aff89-runc.Grb4BK.mount: Deactivated successfully. Jul 16 12:41:51.957002 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 16 12:41:51.960995 kernel: audit: type=1325 audit(1752669711.953:1482): table=filter:126 family=2 entries=9 op=nft_register_rule pid=5209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.961972 kernel: audit: type=1300 audit(1752669711.953:1482): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca8d95ba0 a2=0 a3=7ffca8d95b8c items=0 ppid=2128 pid=5209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.953000 audit[5209]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.953000 audit[5209]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca8d95ba0 a2=0 a3=7ffca8d95b8c items=0 ppid=2128 pid=5209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:51.973937 kernel: audit: type=1327 audit(1752669711.953:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:51.975000 audit[5209]: NETFILTER_CFG table=nat:127 family=2 entries=31 op=nft_register_chain pid=5209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.975000 audit[5209]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffca8d95ba0 a2=0 a3=7ffca8d95b8c items=0 ppid=2128 pid=5209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.988614 kernel: audit: type=1325 audit(1752669711.975:1483): table=nat:127 family=2 entries=31 op=nft_register_chain pid=5209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.988773 kernel: audit: type=1300 audit(1752669711.975:1483): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffca8d95ba0 a2=0 a3=7ffca8d95b8c items=0 ppid=2128 pid=5209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:51.993885 kernel: audit: type=1327 audit(1752669711.975:1483): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:52.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.12.146:22-147.75.109.163:34516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:52.888076 systemd[1]: Started sshd@11-10.230.12.146:22-147.75.109.163:34516.service. Jul 16 12:41:52.895268 kernel: audit: type=1130 audit(1752669712.887:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.12.146:22-147.75.109.163:34516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:53.868000 audit[5211]: USER_ACCT pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:53.875959 kernel: audit: type=1101 audit(1752669713.868:1485): pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:53.876645 sshd[5211]: Accepted publickey for core from 147.75.109.163 port 34516 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:53.876000 audit[5211]: CRED_ACQ pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:53.888139 kernel: audit: type=1103 audit(1752669713.876:1486): pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:53.889616 kernel: audit: type=1006 audit(1752669713.876:1487): pid=5211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 16 12:41:53.876000 audit[5211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcca97f940 a2=3 a3=0 items=0 ppid=1 pid=5211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:53.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:53.888606 sshd[5211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:53.905848 systemd[1]: Started session-12.scope. Jul 16 12:41:53.906509 systemd-logind[1180]: New session 12 of user core. Jul 16 12:41:53.915000 audit[5211]: USER_START pid=5211 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:53.918000 audit[5213]: CRED_ACQ pid=5213 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:55.144753 sshd[5211]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:55.147000 audit[5211]: USER_END pid=5211 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:55.148000 audit[5211]: CRED_DISP pid=5211 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:55.152635 systemd[1]: sshd@11-10.230.12.146:22-147.75.109.163:34516.service: Deactivated successfully. Jul 16 12:41:55.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.12.146:22-147.75.109.163:34516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:55.154392 systemd[1]: session-12.scope: Deactivated successfully. Jul 16 12:41:55.155584 systemd-logind[1180]: Session 12 logged out. Waiting for processes to exit. Jul 16 12:41:55.159388 systemd-logind[1180]: Removed session 12. Jul 16 12:41:55.297776 systemd[1]: Started sshd@12-10.230.12.146:22-147.75.109.163:34532.service. Jul 16 12:41:55.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.12.146:22-147.75.109.163:34532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:56.203000 audit[5223]: USER_ACCT pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:56.205026 sshd[5223]: Accepted publickey for core from 147.75.109.163 port 34532 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:56.205000 audit[5223]: CRED_ACQ pid=5223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:56.205000 audit[5223]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff10e4f3d0 a2=3 a3=0 items=0 ppid=1 pid=5223 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:56.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:56.207002 sshd[5223]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:56.214952 systemd-logind[1180]: New session 13 of user core. Jul 16 12:41:56.216925 systemd[1]: Started session-13.scope. Jul 16 12:41:56.223000 audit[5223]: USER_START pid=5223 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:56.226000 audit[5225]: CRED_ACQ pid=5225 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:57.038051 sshd[5223]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:57.044670 kernel: kauditd_printk_skb: 15 callbacks suppressed Jul 16 12:41:57.044874 kernel: audit: type=1106 audit(1752669717.039:1499): pid=5223 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:57.039000 audit[5223]: USER_END pid=5223 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:57.042000 audit[5223]: CRED_DISP pid=5223 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:57.051517 systemd-logind[1180]: Session 13 logged out. Waiting for processes to exit. Jul 16 12:41:57.052931 systemd[1]: sshd@12-10.230.12.146:22-147.75.109.163:34532.service: Deactivated successfully. Jul 16 12:41:57.054368 systemd[1]: session-13.scope: Deactivated successfully. Jul 16 12:41:57.056913 kernel: audit: type=1104 audit(1752669717.042:1500): pid=5223 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:57.056994 kernel: audit: type=1131 audit(1752669717.048:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.12.146:22-147.75.109.163:34532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:57.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.12.146:22-147.75.109.163:34532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:57.056254 systemd-logind[1180]: Removed session 13. Jul 16 12:41:57.183481 systemd[1]: Started sshd@13-10.230.12.146:22-147.75.109.163:34542.service. Jul 16 12:41:57.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.12.146:22-147.75.109.163:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:57.191890 kernel: audit: type=1130 audit(1752669717.183:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.12.146:22-147.75.109.163:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:58.086000 audit[5233]: USER_ACCT pid=5233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:58.088954 sshd[5233]: Accepted publickey for core from 147.75.109.163 port 34542 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:58.095902 kernel: audit: type=1101 audit(1752669718.086:1503): pid=5233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:58.101000 audit[5233]: CRED_ACQ pid=5233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:58.113504 kernel: audit: type=1103 audit(1752669718.101:1504): pid=5233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:58.113638 kernel: audit: type=1006 audit(1752669718.101:1505): pid=5233 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 16 12:41:58.113767 kernel: audit: type=1300 audit(1752669718.101:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc89c3c4f0 a2=3 a3=0 items=0 ppid=1 pid=5233 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.101000 audit[5233]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc89c3c4f0 a2=3 a3=0 items=0 ppid=1 pid=5233 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:58.120943 sshd[5233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:58.123065 kernel: audit: type=1327 audit(1752669718.101:1505): proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:58.136600 systemd-logind[1180]: New session 14 of user core. Jul 16 12:41:58.136976 systemd[1]: Started session-14.scope. Jul 16 12:41:58.147000 audit[5233]: USER_START pid=5233 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:58.158373 kernel: audit: type=1105 audit(1752669718.147:1506): pid=5233 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:58.157000 audit[5237]: CRED_ACQ pid=5237 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:59.112521 sshd[5233]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:59.121000 audit[5233]: USER_END pid=5233 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:59.121000 audit[5233]: CRED_DISP pid=5233 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:59.124707 systemd-logind[1180]: Session 14 logged out. Waiting for processes to exit. Jul 16 12:41:59.126969 systemd[1]: sshd@13-10.230.12.146:22-147.75.109.163:34542.service: Deactivated successfully. Jul 16 12:41:59.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.12.146:22-147.75.109.163:34542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:59.128401 systemd[1]: session-14.scope: Deactivated successfully. Jul 16 12:41:59.130370 systemd-logind[1180]: Removed session 14. Jul 16 12:42:04.270627 systemd[1]: Started sshd@14-10.230.12.146:22-147.75.109.163:40268.service. Jul 16 12:42:04.278072 kernel: kauditd_printk_skb: 4 callbacks suppressed Jul 16 12:42:04.278814 kernel: audit: type=1130 audit(1752669724.270:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.12.146:22-147.75.109.163:40268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:04.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.12.146:22-147.75.109.163:40268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:05.239000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.246449 sshd[5251]: Accepted publickey for core from 147.75.109.163 port 40268 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:05.252231 kernel: audit: type=1101 audit(1752669725.239:1512): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.252626 kernel: audit: type=1103 audit(1752669725.250:1513): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.250000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.254786 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:05.262266 kernel: audit: type=1006 audit(1752669725.251:1514): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 16 12:42:05.251000 audit[5251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7baba960 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.269515 kernel: audit: type=1300 audit(1752669725.251:1514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7baba960 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.272980 kernel: audit: type=1327 audit(1752669725.251:1514): proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:05.251000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:05.281952 systemd-logind[1180]: New session 15 of user core. Jul 16 12:42:05.284189 systemd[1]: Started session-15.scope. Jul 16 12:42:05.293000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.296000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.308735 kernel: audit: type=1105 audit(1752669725.293:1515): pid=5251 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:05.308823 kernel: audit: type=1103 audit(1752669725.296:1516): pid=5253 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:06.514574 sshd[5251]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:06.516000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:06.516000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:06.526409 systemd[1]: sshd@14-10.230.12.146:22-147.75.109.163:40268.service: Deactivated successfully. Jul 16 12:42:06.527742 systemd[1]: session-15.scope: Deactivated successfully. Jul 16 12:42:06.531236 kernel: audit: type=1106 audit(1752669726.516:1517): pid=5251 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:06.531671 kernel: audit: type=1104 audit(1752669726.516:1518): pid=5251 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:06.532261 systemd-logind[1180]: Session 15 logged out. Waiting for processes to exit. Jul 16 12:42:06.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.12.146:22-147.75.109.163:40268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:06.534653 systemd-logind[1180]: Removed session 15. Jul 16 12:42:06.661699 systemd[1]: Started sshd@15-10.230.12.146:22-147.75.109.163:40280.service. Jul 16 12:42:06.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.12.146:22-147.75.109.163:40280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:07.208000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.208000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0034ff9c0 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:07.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:07.208000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.208000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a84ed0 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:07.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:07.570000 audit[5283]: USER_ACCT pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:07.572520 sshd[5283]: Accepted publickey for core from 147.75.109.163 port 40280 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:07.577000 audit[5283]: CRED_ACQ pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:07.577000 audit[5283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2ac7fc30 a2=3 a3=0 items=0 ppid=1 pid=5283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:07.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:07.579820 sshd[5283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:07.593005 systemd[1]: Started session-16.scope. Jul 16 12:42:07.593553 systemd-logind[1180]: New session 16 of user core. Jul 16 12:42:07.604000 audit[5283]: USER_START pid=5283 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:07.606000 audit[5305]: CRED_ACQ pid=5305 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:07.986000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.986000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526381 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.986000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c006421170 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:42:07.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:42:07.986000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c004bf22d0 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:42:07.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:42:07.986000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526387 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.986000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0064211d0 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:42:07.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:42:07.994000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.994000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c006e98c80 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:42:07.994000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:42:07.999000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.999000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c006e98cc0 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:42:07.999000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:42:07.999000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:07.999000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0064216b0 a2=fc6 a3=0 items=0 ppid=1689 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c452 key=(null) Jul 16 12:42:07.999000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E31322E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 16 12:42:08.609397 sshd[5283]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:08.613000 audit[5283]: USER_END pid=5283 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:08.614000 audit[5283]: CRED_DISP pid=5283 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:08.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.12.146:22-147.75.109.163:40280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:08.617054 systemd[1]: sshd@15-10.230.12.146:22-147.75.109.163:40280.service: Deactivated successfully. Jul 16 12:42:08.618399 systemd[1]: session-16.scope: Deactivated successfully. Jul 16 12:42:08.620082 systemd-logind[1180]: Session 16 logged out. Waiting for processes to exit. Jul 16 12:42:08.622982 systemd-logind[1180]: Removed session 16. Jul 16 12:42:08.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.12.146:22-147.75.109.163:45694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:08.755582 systemd[1]: Started sshd@16-10.230.12.146:22-147.75.109.163:45694.service. Jul 16 12:42:09.679750 sshd[5312]: Accepted publickey for core from 147.75.109.163 port 45694 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:09.688911 kernel: kauditd_printk_skb: 37 callbacks suppressed Jul 16 12:42:09.701589 kernel: audit: type=1101 audit(1752669729.678:1538): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.702687 kernel: audit: type=1103 audit(1752669729.687:1539): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.702759 kernel: audit: type=1006 audit(1752669729.688:1540): pid=5312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 16 12:42:09.678000 audit[5312]: USER_ACCT pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.687000 audit[5312]: CRED_ACQ pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.688000 audit[5312]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6bb87c0 a2=3 a3=0 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.711038 kernel: audit: type=1300 audit(1752669729.688:1540): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6bb87c0 a2=3 a3=0 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.690148 sshd[5312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:09.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:09.716424 kernel: audit: type=1327 audit(1752669729.688:1540): proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:09.715993 systemd-logind[1180]: New session 17 of user core. Jul 16 12:42:09.716904 systemd[1]: Started session-17.scope. Jul 16 12:42:09.724000 audit[5312]: USER_START pid=5312 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.738079 kernel: audit: type=1105 audit(1752669729.724:1541): pid=5312 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.739000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:09.746899 kernel: audit: type=1103 audit(1752669729.739:1542): pid=5314 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:14.124000 audit[5326]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=5326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:14.199630 kernel: audit: type=1325 audit(1752669734.124:1543): table=filter:128 family=2 entries=20 op=nft_register_rule pid=5326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:14.206388 kernel: audit: type=1300 audit(1752669734.124:1543): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe234153e0 a2=0 a3=7ffe234153cc items=0 ppid=2128 pid=5326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.207667 kernel: audit: type=1327 audit(1752669734.124:1543): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:14.124000 audit[5326]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe234153e0 a2=0 a3=7ffe234153cc items=0 ppid=2128 pid=5326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:14.189000 audit[5326]: NETFILTER_CFG table=nat:129 family=2 entries=26 op=nft_register_rule pid=5326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:14.189000 audit[5326]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffe234153e0 a2=0 a3=0 items=0 ppid=2128 pid=5326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:14.192505 sshd[5312]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:14.245000 audit[5312]: USER_END pid=5312 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:14.246000 audit[5312]: CRED_DISP pid=5312 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:14.265380 systemd[1]: sshd@16-10.230.12.146:22-147.75.109.163:45694.service: Deactivated successfully. Jul 16 12:42:14.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.12.146:22-147.75.109.163:45694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:14.272070 systemd[1]: session-17.scope: Deactivated successfully. Jul 16 12:42:14.279061 systemd-logind[1180]: Session 17 logged out. Waiting for processes to exit. Jul 16 12:42:14.290780 systemd-logind[1180]: Removed session 17. Jul 16 12:42:14.293000 audit[5328]: NETFILTER_CFG table=filter:130 family=2 entries=32 op=nft_register_rule pid=5328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:14.293000 audit[5328]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff217affc0 a2=0 a3=7fff217affac items=0 ppid=2128 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:14.298000 audit[5328]: NETFILTER_CFG table=nat:131 family=2 entries=26 op=nft_register_rule pid=5328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:14.298000 audit[5328]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff217affc0 a2=0 a3=0 items=0 ppid=2128 pid=5328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:14.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.12.146:22-147.75.109.163:45700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:14.362283 systemd[1]: Started sshd@17-10.230.12.146:22-147.75.109.163:45700.service. Jul 16 12:42:15.367648 env[1190]: time="2025-07-16T12:42:15.367101395Z" level=info msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" Jul 16 12:42:15.375000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.377456 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 16 12:42:15.378126 kernel: audit: type=1101 audit(1752669735.375:1551): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.384573 sshd[5331]: Accepted publickey for core from 147.75.109.163 port 45700 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:15.388000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.399893 kernel: audit: type=1103 audit(1752669735.388:1552): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.401061 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:15.398000 audit[5331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ae83d90 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:15.415256 kernel: audit: type=1006 audit(1752669735.398:1553): pid=5331 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 16 12:42:15.415341 kernel: audit: type=1300 audit(1752669735.398:1553): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ae83d90 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:15.415400 kernel: audit: type=1327 audit(1752669735.398:1553): proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:15.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:15.445087 systemd-logind[1180]: New session 18 of user core. Jul 16 12:42:15.446756 systemd[1]: Started session-18.scope. Jul 16 12:42:15.456000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.466359 kernel: audit: type=1105 audit(1752669735.456:1554): pid=5331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.466463 kernel: audit: type=1103 audit(1752669735.465:1555): pid=5342 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.465000 audit[5342]: CRED_ACQ pid=5342 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:15.942000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:15.952149 kernel: audit: type=1400 audit(1752669735.942:1556): avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:15.942000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030ea820 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:15.964920 kernel: audit: type=1300 audit(1752669735.942:1556): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030ea820 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:15.987909 kernel: audit: type=1327 audit(1752669735.942:1556): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:15.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:15.943000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:15.943000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0030ea880 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:15.943000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:15.948000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:15.948000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002026560 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:15.948000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:15.951000 audit[1877]: AVC avc: denied { watch } for pid=1877 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 16 12:42:15.951000 audit[1877]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002026580 a2=fc6 a3=0 items=0 ppid=1723 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c243 key=(null) Jul 16 12:42:15.951000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.705 [WARNING][5341] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89dbd0e-d645-4beb-a0eb-e54f765fb87a", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932", Pod:"csi-node-driver-t9nvt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6d89f3a5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.708 [INFO][5341] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.708 [INFO][5341] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" iface="eth0" netns="" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.709 [INFO][5341] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.709 [INFO][5341] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.946 [INFO][5349] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.950 [INFO][5349] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.952 [INFO][5349] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.971 [WARNING][5349] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.971 [INFO][5349] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.977 [INFO][5349] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:15.991582 env[1190]: 2025-07-16 12:42:15.987 [INFO][5341] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:15.991582 env[1190]: time="2025-07-16T12:42:15.990485894Z" level=info msg="TearDown network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" successfully" Jul 16 12:42:15.991582 env[1190]: time="2025-07-16T12:42:15.990548899Z" level=info msg="StopPodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" returns successfully" Jul 16 12:42:16.056843 env[1190]: time="2025-07-16T12:42:16.056483866Z" level=info msg="RemovePodSandbox for \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" Jul 16 12:42:16.056843 env[1190]: time="2025-07-16T12:42:16.056584057Z" level=info msg="Forcibly stopping sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\"" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.215 [WARNING][5368] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89dbd0e-d645-4beb-a0eb-e54f765fb87a", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-uobsc.gb1.brightbox.com", ContainerID:"1ffd26cd676554a2b2e398b26437fe1ced557888bcdfc601f70d5bbc872d0932", Pod:"csi-node-driver-t9nvt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.99.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3f6d89f3a5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.216 [INFO][5368] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.216 [INFO][5368] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" iface="eth0" netns="" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.216 [INFO][5368] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.216 [INFO][5368] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.475 [INFO][5375] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.479 [INFO][5375] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.480 [INFO][5375] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.501 [WARNING][5375] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.501 [INFO][5375] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" HandleID="k8s-pod-network.75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Workload="srv--uobsc.gb1.brightbox.com-k8s-csi--node--driver--t9nvt-eth0" Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.503 [INFO][5375] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:16.512806 env[1190]: 2025-07-16 12:42:16.508 [INFO][5368] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b" Jul 16 12:42:16.528964 env[1190]: time="2025-07-16T12:42:16.512911792Z" level=info msg="TearDown network for sandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" successfully" Jul 16 12:42:16.528964 env[1190]: time="2025-07-16T12:42:16.527650459Z" level=info msg="RemovePodSandbox \"75d936746ea21a32e9063e1780d27a9fcc3b9eee90c1af395470272d867b3f0b\" returns successfully" Jul 16 12:42:18.276165 sshd[5331]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:18.309000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:18.311000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:18.336129 systemd[1]: sshd@17-10.230.12.146:22-147.75.109.163:45700.service: Deactivated successfully. Jul 16 12:42:18.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.12.146:22-147.75.109.163:45700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:18.341363 systemd[1]: session-18.scope: Deactivated successfully. Jul 16 12:42:18.347431 systemd-logind[1180]: Session 18 logged out. Waiting for processes to exit. Jul 16 12:42:18.355926 systemd-logind[1180]: Removed session 18. Jul 16 12:42:18.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.12.146:22-147.75.109.163:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:18.408293 systemd[1]: Started sshd@18-10.230.12.146:22-147.75.109.163:50020.service. Jul 16 12:42:19.340000 audit[5384]: USER_ACCT pid=5384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:19.342788 sshd[5384]: Accepted publickey for core from 147.75.109.163 port 50020 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:19.343000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:19.343000 audit[5384]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d3e2c30 a2=3 a3=0 items=0 ppid=1 pid=5384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:19.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:19.346073 sshd[5384]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:19.370945 systemd-logind[1180]: New session 19 of user core. Jul 16 12:42:19.372159 systemd[1]: Started session-19.scope. Jul 16 12:42:19.380000 audit[5384]: USER_START pid=5384 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:19.382000 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:20.617189 sshd[5384]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:20.635800 kernel: kauditd_printk_skb: 20 callbacks suppressed Jul 16 12:42:20.640473 kernel: audit: type=1106 audit(1752669740.620:1569): pid=5384 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:20.642113 kernel: audit: type=1104 audit(1752669740.630:1570): pid=5384 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:20.620000 audit[5384]: USER_END pid=5384 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:20.630000 audit[5384]: CRED_DISP pid=5384 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:20.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.12.146:22-147.75.109.163:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:20.633950 systemd[1]: sshd@18-10.230.12.146:22-147.75.109.163:50020.service: Deactivated successfully. Jul 16 12:42:20.635784 systemd[1]: session-19.scope: Deactivated successfully. Jul 16 12:42:20.636937 systemd-logind[1180]: Session 19 logged out. Waiting for processes to exit. Jul 16 12:42:20.646617 systemd-logind[1180]: Removed session 19. Jul 16 12:42:20.655904 kernel: audit: type=1131 audit(1752669740.633:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.12.146:22-147.75.109.163:50020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:20.756000 audit[5417]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=5417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:20.756000 audit[5417]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff6acee5f0 a2=0 a3=7fff6acee5dc items=0 ppid=2128 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.770196 kernel: audit: type=1325 audit(1752669740.756:1572): table=filter:132 family=2 entries=20 op=nft_register_rule pid=5417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:20.770340 kernel: audit: type=1300 audit(1752669740.756:1572): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff6acee5f0 a2=0 a3=7fff6acee5dc items=0 ppid=2128 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:20.781908 kernel: audit: type=1327 audit(1752669740.756:1572): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:20.780000 audit[5417]: NETFILTER_CFG table=nat:133 family=2 entries=110 op=nft_register_chain pid=5417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:20.786913 kernel: audit: type=1325 audit(1752669740.780:1573): table=nat:133 family=2 entries=110 op=nft_register_chain pid=5417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:20.780000 audit[5417]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff6acee5f0 a2=0 a3=7fff6acee5dc items=0 ppid=2128 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:20.798957 kernel: audit: type=1300 audit(1752669740.780:1573): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff6acee5f0 a2=0 a3=7fff6acee5dc items=0 ppid=2128 pid=5417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.799076 kernel: audit: type=1327 audit(1752669740.780:1573): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:25.780315 systemd[1]: Started sshd@19-10.230.12.146:22-147.75.109.163:50032.service. Jul 16 12:42:25.817144 kernel: audit: type=1130 audit(1752669745.781:1574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.12.146:22-147.75.109.163:50032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:25.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.12.146:22-147.75.109.163:50032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:26.781000 audit[5440]: USER_ACCT pid=5440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.786170 sshd[5440]: Accepted publickey for core from 147.75.109.163 port 50032 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:26.793911 kernel: audit: type=1101 audit(1752669746.781:1575): pid=5440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.794013 kernel: audit: type=1103 audit(1752669746.789:1576): pid=5440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.789000 audit[5440]: CRED_ACQ pid=5440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.792384 sshd[5440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:26.801497 kernel: audit: type=1006 audit(1752669746.789:1577): pid=5440 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Jul 16 12:42:26.801900 kernel: audit: type=1300 audit(1752669746.789:1577): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd53595f0 a2=3 a3=0 items=0 ppid=1 pid=5440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:26.789000 audit[5440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd53595f0 a2=3 a3=0 items=0 ppid=1 pid=5440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:26.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:26.810929 kernel: audit: type=1327 audit(1752669746.789:1577): proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:26.843322 systemd-logind[1180]: New session 20 of user core. Jul 16 12:42:26.845151 systemd[1]: Started session-20.scope. Jul 16 12:42:26.851000 audit[5440]: USER_START pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.864365 kernel: audit: type=1105 audit(1752669746.851:1578): pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.864000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:26.873925 kernel: audit: type=1103 audit(1752669746.864:1579): pid=5442 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:27.031000 audit[4893]: AVC avc: denied { watch } for pid=4893 comm="apiserver" path="/calico-apiserver-certs/..2025_07_16_12_40_51.3444307921/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c709 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c709 tclass=file permissive=0 Jul 16 12:42:27.031000 audit[4893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f62640 a2=fc6 a3=0 items=0 ppid=3875 pid=4893 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c709 key=(null) Jul 16 12:42:27.049297 kernel: audit: type=1400 audit(1752669747.031:1580): avc: denied { watch } for pid=4893 comm="apiserver" path="/calico-apiserver-certs/..2025_07_16_12_40_51.3444307921/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c709 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c709 tclass=file permissive=0 Jul 16 12:42:27.049456 kernel: audit: type=1300 audit(1752669747.031:1580): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f62640 a2=fc6 a3=0 items=0 ppid=3875 pid=4893 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c709 key=(null) Jul 16 12:42:27.031000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 16 12:42:28.090187 sshd[5440]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:28.093000 audit[5440]: USER_END pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:28.093000 audit[5440]: CRED_DISP pid=5440 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:28.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.12.146:22-147.75.109.163:50032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:28.098064 systemd[1]: sshd@19-10.230.12.146:22-147.75.109.163:50032.service: Deactivated successfully. Jul 16 12:42:28.100641 systemd[1]: session-20.scope: Deactivated successfully. Jul 16 12:42:28.101646 systemd-logind[1180]: Session 20 logged out. Waiting for processes to exit. Jul 16 12:42:28.104621 systemd-logind[1180]: Removed session 20. Jul 16 12:42:29.664000 audit[4933]: AVC avc: denied { watch } for pid=4933 comm="apiserver" path="/calico-apiserver-certs/..2025_07_16_12_40_51.3635090627/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c159,c616 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c159,c616 tclass=file permissive=0 Jul 16 12:42:29.664000 audit[4933]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001b1a3e0 a2=fc6 a3=0 items=0 ppid=4047 pid=4933 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c159,c616 key=(null) Jul 16 12:42:29.664000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 16 12:42:33.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.12.146:22-147.75.109.163:34512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:33.385277 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 16 12:42:33.390789 kernel: audit: type=1130 audit(1752669753.340:1585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.12.146:22-147.75.109.163:34512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:33.338218 systemd[1]: Started sshd@20-10.230.12.146:22-147.75.109.163:34512.service. Jul 16 12:42:34.431339 sshd[5458]: Accepted publickey for core from 147.75.109.163 port 34512 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:42:34.530043 kernel: audit: type=1101 audit(1752669754.429:1586): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.536772 kernel: audit: type=1103 audit(1752669754.484:1587): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.536997 kernel: audit: type=1006 audit(1752669754.484:1588): pid=5458 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 16 12:42:34.537968 kernel: audit: type=1300 audit(1752669754.484:1588): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2afbad70 a2=3 a3=0 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:34.538603 kernel: audit: type=1327 audit(1752669754.484:1588): proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:34.429000 audit[5458]: USER_ACCT pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.484000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.484000 audit[5458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2afbad70 a2=3 a3=0 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:34.484000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:42:34.523211 sshd[5458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:42:34.611998 kubelet[1989]: E0716 12:42:34.485170 1989 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.641s" Jul 16 12:42:34.627882 systemd-logind[1180]: New session 21 of user core. Jul 16 12:42:34.632844 systemd[1]: Started session-21.scope. Jul 16 12:42:34.647000 audit[5458]: USER_START pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.662621 kernel: audit: type=1105 audit(1752669754.647:1589): pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.663000 audit[5460]: CRED_ACQ pid=5460 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:34.679606 kernel: audit: type=1103 audit(1752669754.663:1590): pid=5460 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:36.130001 sshd[5458]: pam_unix(sshd:session): session closed for user core Jul 16 12:42:36.162000 audit[5458]: USER_END pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:36.178983 kernel: audit: type=1106 audit(1752669756.162:1591): pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:36.179542 kernel: audit: type=1104 audit(1752669756.163:1592): pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:36.163000 audit[5458]: CRED_DISP pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:42:36.188225 systemd[1]: sshd@20-10.230.12.146:22-147.75.109.163:34512.service: Deactivated successfully. Jul 16 12:42:36.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.12.146:22-147.75.109.163:34512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:42:36.191360 systemd[1]: session-21.scope: Deactivated successfully. Jul 16 12:42:36.193106 systemd-logind[1180]: Session 21 logged out. Waiting for processes to exit. Jul 16 12:42:36.199217 systemd-logind[1180]: Removed session 21.