Sep 6 01:22:38.042836 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 01:22:38.042882 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:22:38.042900 kernel: BIOS-provided physical RAM map: Sep 6 01:22:38.042911 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 6 01:22:38.042919 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 6 01:22:38.042929 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 6 01:22:38.042939 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Sep 6 01:22:38.042949 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Sep 6 01:22:38.042958 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 6 01:22:38.042967 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Sep 6 01:22:38.042980 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 6 01:22:38.042990 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 6 01:22:38.042999 kernel: NX (Execute Disable) protection: active Sep 6 01:22:38.043009 kernel: SMBIOS 2.8 present. Sep 6 01:22:38.043021 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Sep 6 01:22:38.043031 kernel: Hypervisor detected: KVM Sep 6 01:22:38.043045 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 6 01:22:38.043055 kernel: kvm-clock: cpu 0, msr 2d19f001, primary cpu clock Sep 6 01:22:38.043071 kernel: kvm-clock: using sched offset of 5443978129 cycles Sep 6 01:22:38.043083 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 6 01:22:38.043093 kernel: tsc: Detected 2799.998 MHz processor Sep 6 01:22:38.043111 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 01:22:38.043124 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 01:22:38.043134 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Sep 6 01:22:38.043144 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 01:22:38.043160 kernel: Using GB pages for direct mapping Sep 6 01:22:38.043170 kernel: ACPI: Early table checksum verification disabled Sep 6 01:22:38.043180 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Sep 6 01:22:38.043191 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043201 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043211 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043222 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Sep 6 01:22:38.043232 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043242 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043256 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043266 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:22:38.043276 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Sep 6 01:22:38.043287 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Sep 6 01:22:38.043297 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Sep 6 01:22:38.043307 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Sep 6 01:22:38.043323 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Sep 6 01:22:38.043337 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Sep 6 01:22:38.043348 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Sep 6 01:22:38.043359 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 01:22:38.043370 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 01:22:38.043381 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 6 01:22:38.043392 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Sep 6 01:22:38.043402 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 6 01:22:38.043417 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Sep 6 01:22:38.043437 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 6 01:22:38.045182 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Sep 6 01:22:38.045198 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 6 01:22:38.045210 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Sep 6 01:22:38.045221 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 6 01:22:38.045231 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Sep 6 01:22:38.045242 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 6 01:22:38.045253 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Sep 6 01:22:38.045264 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 6 01:22:38.045282 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Sep 6 01:22:38.045300 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 6 01:22:38.045312 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 6 01:22:38.045323 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Sep 6 01:22:38.045334 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Sep 6 01:22:38.045345 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Sep 6 01:22:38.045356 kernel: Zone ranges: Sep 6 01:22:38.045371 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 01:22:38.045383 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Sep 6 01:22:38.045399 kernel: Normal empty Sep 6 01:22:38.045410 kernel: Movable zone start for each node Sep 6 01:22:38.045421 kernel: Early memory node ranges Sep 6 01:22:38.045447 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 6 01:22:38.045459 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Sep 6 01:22:38.045470 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Sep 6 01:22:38.045481 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 01:22:38.045491 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 6 01:22:38.045502 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Sep 6 01:22:38.045518 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 6 01:22:38.045529 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 6 01:22:38.045552 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 6 01:22:38.045562 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 6 01:22:38.045573 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 6 01:22:38.045584 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 01:22:38.045594 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 6 01:22:38.045605 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 6 01:22:38.045615 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 01:22:38.045642 kernel: TSC deadline timer available Sep 6 01:22:38.045653 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Sep 6 01:22:38.045664 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Sep 6 01:22:38.045675 kernel: Booting paravirtualized kernel on KVM Sep 6 01:22:38.045686 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 01:22:38.045697 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Sep 6 01:22:38.045707 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 6 01:22:38.045718 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 6 01:22:38.045729 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 6 01:22:38.045744 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Sep 6 01:22:38.045754 kernel: kvm-guest: PV spinlocks enabled Sep 6 01:22:38.045765 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 01:22:38.045776 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Sep 6 01:22:38.045787 kernel: Policy zone: DMA32 Sep 6 01:22:38.045799 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:22:38.045811 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 01:22:38.045822 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 01:22:38.045837 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 01:22:38.045848 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 01:22:38.045859 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 192524K reserved, 0K cma-reserved) Sep 6 01:22:38.045870 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 6 01:22:38.045881 kernel: Kernel/User page tables isolation: enabled Sep 6 01:22:38.045892 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 01:22:38.045903 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 01:22:38.045914 kernel: rcu: Hierarchical RCU implementation. Sep 6 01:22:38.045925 kernel: rcu: RCU event tracing is enabled. Sep 6 01:22:38.045946 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 6 01:22:38.045959 kernel: Rude variant of Tasks RCU enabled. Sep 6 01:22:38.045973 kernel: Tracing variant of Tasks RCU enabled. Sep 6 01:22:38.045985 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 01:22:38.045996 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 6 01:22:38.046007 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Sep 6 01:22:38.046018 kernel: random: crng init done Sep 6 01:22:38.046042 kernel: Console: colour VGA+ 80x25 Sep 6 01:22:38.046053 kernel: printk: console [tty0] enabled Sep 6 01:22:38.046065 kernel: printk: console [ttyS0] enabled Sep 6 01:22:38.046076 kernel: ACPI: Core revision 20210730 Sep 6 01:22:38.046088 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 01:22:38.046111 kernel: x2apic enabled Sep 6 01:22:38.046124 kernel: Switched APIC routing to physical x2apic. Sep 6 01:22:38.046136 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Sep 6 01:22:38.046148 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Sep 6 01:22:38.046159 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 6 01:22:38.046175 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 6 01:22:38.046187 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 6 01:22:38.046198 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 01:22:38.046209 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 01:22:38.046220 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 01:22:38.046232 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Sep 6 01:22:38.046243 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 6 01:22:38.046255 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 6 01:22:38.046266 kernel: MDS: Mitigation: Clear CPU buffers Sep 6 01:22:38.046277 kernel: MMIO Stale Data: Unknown: No mitigations Sep 6 01:22:38.046292 kernel: SRBDS: Unknown: Dependent on hypervisor status Sep 6 01:22:38.046304 kernel: active return thunk: its_return_thunk Sep 6 01:22:38.046315 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 01:22:38.046326 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 01:22:38.046338 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 01:22:38.046349 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 01:22:38.046360 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 01:22:38.046378 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 6 01:22:38.046389 kernel: Freeing SMP alternatives memory: 32K Sep 6 01:22:38.046401 kernel: pid_max: default: 32768 minimum: 301 Sep 6 01:22:38.046412 kernel: LSM: Security Framework initializing Sep 6 01:22:38.046437 kernel: SELinux: Initializing. Sep 6 01:22:38.049678 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 01:22:38.049695 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 01:22:38.049707 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Sep 6 01:22:38.049719 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Sep 6 01:22:38.049731 kernel: signal: max sigframe size: 1776 Sep 6 01:22:38.049743 kernel: rcu: Hierarchical SRCU implementation. Sep 6 01:22:38.049759 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 01:22:38.049771 kernel: smp: Bringing up secondary CPUs ... Sep 6 01:22:38.049789 kernel: x86: Booting SMP configuration: Sep 6 01:22:38.049808 kernel: .... node #0, CPUs: #1 Sep 6 01:22:38.049829 kernel: kvm-clock: cpu 1, msr 2d19f041, secondary cpu clock Sep 6 01:22:38.049841 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 6 01:22:38.049852 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Sep 6 01:22:38.049864 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 01:22:38.049875 kernel: smpboot: Max logical packages: 16 Sep 6 01:22:38.049887 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Sep 6 01:22:38.049898 kernel: devtmpfs: initialized Sep 6 01:22:38.049910 kernel: x86/mm: Memory block size: 128MB Sep 6 01:22:38.049921 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 01:22:38.049937 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 6 01:22:38.049949 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 01:22:38.049960 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 01:22:38.049972 kernel: audit: initializing netlink subsys (disabled) Sep 6 01:22:38.049983 kernel: audit: type=2000 audit(1757121756.947:1): state=initialized audit_enabled=0 res=1 Sep 6 01:22:38.049995 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 01:22:38.050006 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 01:22:38.050018 kernel: cpuidle: using governor menu Sep 6 01:22:38.050029 kernel: ACPI: bus type PCI registered Sep 6 01:22:38.050045 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 01:22:38.050056 kernel: dca service started, version 1.12.1 Sep 6 01:22:38.050068 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Sep 6 01:22:38.050079 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Sep 6 01:22:38.050091 kernel: PCI: Using configuration type 1 for base access Sep 6 01:22:38.050102 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 01:22:38.050125 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 01:22:38.050136 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 01:22:38.050153 kernel: ACPI: Added _OSI(Module Device) Sep 6 01:22:38.050164 kernel: ACPI: Added _OSI(Processor Device) Sep 6 01:22:38.050176 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 01:22:38.050187 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 01:22:38.050198 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 01:22:38.050209 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 01:22:38.050221 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 01:22:38.050232 kernel: ACPI: Interpreter enabled Sep 6 01:22:38.050243 kernel: ACPI: PM: (supports S0 S5) Sep 6 01:22:38.050255 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 01:22:38.050271 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 01:22:38.050283 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Sep 6 01:22:38.050294 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 6 01:22:38.050606 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 6 01:22:38.050773 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 6 01:22:38.050938 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 6 01:22:38.050955 kernel: PCI host bridge to bus 0000:00 Sep 6 01:22:38.051161 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 6 01:22:38.051310 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 6 01:22:38.051469 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 6 01:22:38.051630 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Sep 6 01:22:38.051779 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 6 01:22:38.051923 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Sep 6 01:22:38.052072 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 6 01:22:38.052285 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Sep 6 01:22:38.052481 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Sep 6 01:22:38.052644 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Sep 6 01:22:38.052802 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Sep 6 01:22:38.052959 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Sep 6 01:22:38.053126 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 6 01:22:38.053350 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.053534 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Sep 6 01:22:38.053737 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.053905 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Sep 6 01:22:38.054097 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.054269 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Sep 6 01:22:38.058605 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.058791 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Sep 6 01:22:38.058991 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.059168 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Sep 6 01:22:38.059355 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.059532 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Sep 6 01:22:38.059716 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.059874 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Sep 6 01:22:38.060045 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Sep 6 01:22:38.060216 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Sep 6 01:22:38.060391 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Sep 6 01:22:38.060571 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Sep 6 01:22:38.060727 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Sep 6 01:22:38.060889 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Sep 6 01:22:38.061045 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Sep 6 01:22:38.061261 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Sep 6 01:22:38.061420 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Sep 6 01:22:38.061596 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Sep 6 01:22:38.061777 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Sep 6 01:22:38.061971 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Sep 6 01:22:38.062161 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Sep 6 01:22:38.062365 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Sep 6 01:22:38.062539 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Sep 6 01:22:38.062703 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Sep 6 01:22:38.062896 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Sep 6 01:22:38.063065 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Sep 6 01:22:38.063265 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Sep 6 01:22:38.063447 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Sep 6 01:22:38.063620 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 01:22:38.063781 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 01:22:38.063950 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:22:38.064154 kernel: pci_bus 0000:02: extended config space not accessible Sep 6 01:22:38.064356 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Sep 6 01:22:38.071641 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Sep 6 01:22:38.071848 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 01:22:38.072022 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 01:22:38.072241 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Sep 6 01:22:38.072410 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Sep 6 01:22:38.072604 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 01:22:38.072796 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 01:22:38.072985 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:22:38.073232 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Sep 6 01:22:38.073458 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Sep 6 01:22:38.073653 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 01:22:38.073869 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 01:22:38.074040 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:22:38.074230 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 01:22:38.074398 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 01:22:38.074577 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:22:38.074740 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 01:22:38.074909 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 01:22:38.075075 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:22:38.075265 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 01:22:38.075443 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 01:22:38.075607 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:22:38.075775 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 01:22:38.075935 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 01:22:38.076095 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:22:38.076270 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 01:22:38.076451 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 01:22:38.076616 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:22:38.076634 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 6 01:22:38.076646 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 6 01:22:38.076665 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 6 01:22:38.076677 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 6 01:22:38.076689 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Sep 6 01:22:38.076700 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Sep 6 01:22:38.076712 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Sep 6 01:22:38.076724 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Sep 6 01:22:38.076735 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Sep 6 01:22:38.076747 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Sep 6 01:22:38.076759 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Sep 6 01:22:38.076776 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Sep 6 01:22:38.076788 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Sep 6 01:22:38.076799 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Sep 6 01:22:38.076811 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Sep 6 01:22:38.076823 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Sep 6 01:22:38.076834 kernel: iommu: Default domain type: Translated Sep 6 01:22:38.076846 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 01:22:38.077015 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Sep 6 01:22:38.077185 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 6 01:22:38.077347 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Sep 6 01:22:38.077365 kernel: vgaarb: loaded Sep 6 01:22:38.077378 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 01:22:38.077389 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 01:22:38.077401 kernel: PTP clock support registered Sep 6 01:22:38.077413 kernel: PCI: Using ACPI for IRQ routing Sep 6 01:22:38.077424 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 6 01:22:38.077453 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 6 01:22:38.077471 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Sep 6 01:22:38.077483 kernel: clocksource: Switched to clocksource kvm-clock Sep 6 01:22:38.077494 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 01:22:38.077506 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 01:22:38.077518 kernel: pnp: PnP ACPI init Sep 6 01:22:38.077710 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Sep 6 01:22:38.077730 kernel: pnp: PnP ACPI: found 5 devices Sep 6 01:22:38.077742 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 01:22:38.077760 kernel: NET: Registered PF_INET protocol family Sep 6 01:22:38.077772 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 01:22:38.077784 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 6 01:22:38.077796 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 01:22:38.077808 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 01:22:38.077819 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 6 01:22:38.077831 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 6 01:22:38.077843 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 01:22:38.077855 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 01:22:38.077871 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 01:22:38.077883 kernel: NET: Registered PF_XDP protocol family Sep 6 01:22:38.078066 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Sep 6 01:22:38.078243 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Sep 6 01:22:38.078404 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Sep 6 01:22:38.085667 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Sep 6 01:22:38.085847 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 6 01:22:38.086020 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 6 01:22:38.086201 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 6 01:22:38.086365 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 6 01:22:38.086550 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Sep 6 01:22:38.086714 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Sep 6 01:22:38.086873 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Sep 6 01:22:38.087040 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Sep 6 01:22:38.087242 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Sep 6 01:22:38.087409 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Sep 6 01:22:38.087594 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Sep 6 01:22:38.087761 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Sep 6 01:22:38.087947 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 01:22:38.088136 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 01:22:38.088298 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 01:22:38.088470 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Sep 6 01:22:38.088646 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 01:22:38.088812 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:22:38.088994 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 01:22:38.089167 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Sep 6 01:22:38.089326 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 01:22:38.089500 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:22:38.089660 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 01:22:38.089826 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Sep 6 01:22:38.090008 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 01:22:38.090223 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:22:38.090385 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 01:22:38.090596 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Sep 6 01:22:38.090756 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 01:22:38.090917 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:22:38.091076 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 01:22:38.091257 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Sep 6 01:22:38.091419 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 01:22:38.091607 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:22:38.091770 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 01:22:38.091929 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Sep 6 01:22:38.092100 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 01:22:38.092273 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:22:38.100599 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 01:22:38.100800 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Sep 6 01:22:38.100964 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 01:22:38.101136 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:22:38.101297 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 01:22:38.101473 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Sep 6 01:22:38.101639 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 01:22:38.101805 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:22:38.101955 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 6 01:22:38.102099 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 6 01:22:38.102261 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 6 01:22:38.102415 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Sep 6 01:22:38.102601 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Sep 6 01:22:38.102755 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Sep 6 01:22:38.102942 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Sep 6 01:22:38.103117 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Sep 6 01:22:38.103273 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:22:38.103456 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Sep 6 01:22:38.103637 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Sep 6 01:22:38.103803 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Sep 6 01:22:38.103953 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:22:38.104147 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Sep 6 01:22:38.104302 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Sep 6 01:22:38.104475 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:22:38.104637 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Sep 6 01:22:38.104786 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Sep 6 01:22:38.104934 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:22:38.105126 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Sep 6 01:22:38.105286 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Sep 6 01:22:38.105455 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:22:38.105656 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Sep 6 01:22:38.105814 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Sep 6 01:22:38.105965 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:22:38.106156 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Sep 6 01:22:38.106319 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Sep 6 01:22:38.106487 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:22:38.106661 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Sep 6 01:22:38.106817 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Sep 6 01:22:38.106981 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:22:38.107000 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Sep 6 01:22:38.107014 kernel: PCI: CLS 0 bytes, default 64 Sep 6 01:22:38.107026 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 01:22:38.107053 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Sep 6 01:22:38.107066 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 01:22:38.107078 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Sep 6 01:22:38.107091 kernel: Initialise system trusted keyrings Sep 6 01:22:38.107115 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 6 01:22:38.107129 kernel: Key type asymmetric registered Sep 6 01:22:38.107141 kernel: Asymmetric key parser 'x509' registered Sep 6 01:22:38.107153 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 01:22:38.107166 kernel: io scheduler mq-deadline registered Sep 6 01:22:38.107183 kernel: io scheduler kyber registered Sep 6 01:22:38.107195 kernel: io scheduler bfq registered Sep 6 01:22:38.107359 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Sep 6 01:22:38.113470 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Sep 6 01:22:38.113644 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.113807 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Sep 6 01:22:38.113965 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Sep 6 01:22:38.114147 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.114308 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Sep 6 01:22:38.114479 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Sep 6 01:22:38.114636 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.114802 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Sep 6 01:22:38.114959 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Sep 6 01:22:38.115136 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.115296 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Sep 6 01:22:38.115477 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Sep 6 01:22:38.115637 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.115803 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Sep 6 01:22:38.115960 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Sep 6 01:22:38.116144 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.116305 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Sep 6 01:22:38.116480 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Sep 6 01:22:38.116640 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.116799 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Sep 6 01:22:38.116986 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Sep 6 01:22:38.117199 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:22:38.117219 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 01:22:38.117233 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Sep 6 01:22:38.117245 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Sep 6 01:22:38.117258 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 01:22:38.117271 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 01:22:38.117283 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 6 01:22:38.117295 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 6 01:22:38.117313 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 6 01:22:38.123048 kernel: rtc_cmos 00:03: RTC can wake from S4 Sep 6 01:22:38.123074 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 6 01:22:38.123241 kernel: rtc_cmos 00:03: registered as rtc0 Sep 6 01:22:38.123393 kernel: rtc_cmos 00:03: setting system clock to 2025-09-06T01:22:37 UTC (1757121757) Sep 6 01:22:38.123564 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Sep 6 01:22:38.123584 kernel: intel_pstate: CPU model not supported Sep 6 01:22:38.123604 kernel: NET: Registered PF_INET6 protocol family Sep 6 01:22:38.123617 kernel: Segment Routing with IPv6 Sep 6 01:22:38.123629 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 01:22:38.123642 kernel: NET: Registered PF_PACKET protocol family Sep 6 01:22:38.123655 kernel: Key type dns_resolver registered Sep 6 01:22:38.123674 kernel: IPI shorthand broadcast: enabled Sep 6 01:22:38.123687 kernel: sched_clock: Marking stable (1096733087, 215936046)->(1606271981, -293602848) Sep 6 01:22:38.123699 kernel: registered taskstats version 1 Sep 6 01:22:38.123711 kernel: Loading compiled-in X.509 certificates Sep 6 01:22:38.123724 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 01:22:38.123741 kernel: Key type .fscrypt registered Sep 6 01:22:38.123753 kernel: Key type fscrypt-provisioning registered Sep 6 01:22:38.123765 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 01:22:38.123777 kernel: ima: Allocated hash algorithm: sha1 Sep 6 01:22:38.123790 kernel: ima: No architecture policies found Sep 6 01:22:38.123802 kernel: clk: Disabling unused clocks Sep 6 01:22:38.123815 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 01:22:38.123827 kernel: Write protecting the kernel read-only data: 28672k Sep 6 01:22:38.123844 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 01:22:38.123857 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 01:22:38.123870 kernel: Run /init as init process Sep 6 01:22:38.123882 kernel: with arguments: Sep 6 01:22:38.123894 kernel: /init Sep 6 01:22:38.123906 kernel: with environment: Sep 6 01:22:38.123918 kernel: HOME=/ Sep 6 01:22:38.123930 kernel: TERM=linux Sep 6 01:22:38.123942 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 01:22:38.123957 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:22:38.123977 systemd[1]: Detected virtualization kvm. Sep 6 01:22:38.123990 systemd[1]: Detected architecture x86-64. Sep 6 01:22:38.124003 systemd[1]: Running in initrd. Sep 6 01:22:38.124015 systemd[1]: No hostname configured, using default hostname. Sep 6 01:22:38.124028 systemd[1]: Hostname set to . Sep 6 01:22:38.124041 systemd[1]: Initializing machine ID from VM UUID. Sep 6 01:22:38.124058 systemd[1]: Queued start job for default target initrd.target. Sep 6 01:22:38.124076 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:22:38.124089 systemd[1]: Reached target cryptsetup.target. Sep 6 01:22:38.124111 systemd[1]: Reached target paths.target. Sep 6 01:22:38.124134 systemd[1]: Reached target slices.target. Sep 6 01:22:38.124151 systemd[1]: Reached target swap.target. Sep 6 01:22:38.124165 systemd[1]: Reached target timers.target. Sep 6 01:22:38.124179 systemd[1]: Listening on iscsid.socket. Sep 6 01:22:38.124196 systemd[1]: Listening on iscsiuio.socket. Sep 6 01:22:38.124210 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 01:22:38.124227 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 01:22:38.124240 systemd[1]: Listening on systemd-journald.socket. Sep 6 01:22:38.124253 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:22:38.124267 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:22:38.124280 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:22:38.124293 systemd[1]: Reached target sockets.target. Sep 6 01:22:38.124306 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:22:38.124324 systemd[1]: Finished network-cleanup.service. Sep 6 01:22:38.124337 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 01:22:38.124351 systemd[1]: Starting systemd-journald.service... Sep 6 01:22:38.124364 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:22:38.124377 systemd[1]: Starting systemd-resolved.service... Sep 6 01:22:38.124390 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 01:22:38.124403 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:22:38.124416 kernel: audit: type=1130 audit(1757121758.043:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.124446 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 01:22:38.124459 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 01:22:38.124472 kernel: Bridge firewalling registered Sep 6 01:22:38.124489 systemd-journald[201]: Journal started Sep 6 01:22:38.124563 systemd-journald[201]: Runtime Journal (/run/log/journal/9d9ac96b03c245178e7abbf7ea95e22d) is 4.7M, max 38.1M, 33.3M free. Sep 6 01:22:38.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.046496 systemd-modules-load[202]: Inserted module 'overlay' Sep 6 01:22:38.100042 systemd-resolved[203]: Positive Trust Anchors: Sep 6 01:22:38.154850 systemd[1]: Started systemd-resolved.service. Sep 6 01:22:38.154881 kernel: audit: type=1130 audit(1757121758.147:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.100064 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:22:38.163175 systemd[1]: Started systemd-journald.service. Sep 6 01:22:38.163203 kernel: audit: type=1130 audit(1757121758.154:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.163231 kernel: SCSI subsystem initialized Sep 6 01:22:38.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.100116 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:22:38.180626 kernel: audit: type=1130 audit(1757121758.163:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.180665 kernel: audit: type=1130 audit(1757121758.170:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.180684 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 01:22:38.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.103404 systemd-resolved[203]: Defaulting to hostname 'linux'. Sep 6 01:22:38.185042 kernel: device-mapper: uevent: version 1.0.3 Sep 6 01:22:38.185067 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 01:22:38.125011 systemd-modules-load[202]: Inserted module 'br_netfilter' Sep 6 01:22:38.164246 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 01:22:38.171422 systemd[1]: Reached target nss-lookup.target. Sep 6 01:22:38.181219 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 01:22:38.185923 systemd-modules-load[202]: Inserted module 'dm_multipath' Sep 6 01:22:38.187941 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:22:38.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.194048 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:22:38.209778 kernel: audit: type=1130 audit(1757121758.194:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.209810 kernel: audit: type=1130 audit(1757121758.203:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.196524 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:22:38.216714 kernel: audit: type=1130 audit(1757121758.210:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.203352 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:22:38.209794 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:22:38.224071 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 01:22:38.225842 systemd[1]: Starting dracut-cmdline.service... Sep 6 01:22:38.245358 kernel: audit: type=1130 audit(1757121758.224:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.245491 dracut-cmdline[224]: dracut-dracut-053 Sep 6 01:22:38.245491 dracut-cmdline[224]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Sep 6 01:22:38.245491 dracut-cmdline[224]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:22:38.330518 kernel: Loading iSCSI transport class v2.0-870. Sep 6 01:22:38.350462 kernel: iscsi: registered transport (tcp) Sep 6 01:22:38.377786 kernel: iscsi: registered transport (qla4xxx) Sep 6 01:22:38.377880 kernel: QLogic iSCSI HBA Driver Sep 6 01:22:38.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.428488 systemd[1]: Finished dracut-cmdline.service. Sep 6 01:22:38.430503 systemd[1]: Starting dracut-pre-udev.service... Sep 6 01:22:38.490482 kernel: raid6: sse2x4 gen() 14348 MB/s Sep 6 01:22:38.508487 kernel: raid6: sse2x4 xor() 8138 MB/s Sep 6 01:22:38.526480 kernel: raid6: sse2x2 gen() 9777 MB/s Sep 6 01:22:38.544489 kernel: raid6: sse2x2 xor() 8490 MB/s Sep 6 01:22:38.562484 kernel: raid6: sse2x1 gen() 10114 MB/s Sep 6 01:22:38.580920 kernel: raid6: sse2x1 xor() 7546 MB/s Sep 6 01:22:38.580966 kernel: raid6: using algorithm sse2x4 gen() 14348 MB/s Sep 6 01:22:38.580984 kernel: raid6: .... xor() 8138 MB/s, rmw enabled Sep 6 01:22:38.582168 kernel: raid6: using ssse3x2 recovery algorithm Sep 6 01:22:38.598460 kernel: xor: automatically using best checksumming function avx Sep 6 01:22:38.719590 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 01:22:38.735363 systemd[1]: Finished dracut-pre-udev.service. Sep 6 01:22:38.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.736000 audit: BPF prog-id=7 op=LOAD Sep 6 01:22:38.736000 audit: BPF prog-id=8 op=LOAD Sep 6 01:22:38.738280 systemd[1]: Starting systemd-udevd.service... Sep 6 01:22:38.757719 systemd-udevd[401]: Using default interface naming scheme 'v252'. Sep 6 01:22:38.766417 systemd[1]: Started systemd-udevd.service. Sep 6 01:22:38.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.771931 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 01:22:38.791496 dracut-pre-trigger[414]: rd.md=0: removing MD RAID activation Sep 6 01:22:38.833894 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 01:22:38.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:38.835721 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:22:38.935569 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:22:38.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:39.025468 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Sep 6 01:22:39.089179 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 01:22:39.089205 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 01:22:39.089231 kernel: GPT:17805311 != 125829119 Sep 6 01:22:39.089248 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 01:22:39.089264 kernel: GPT:17805311 != 125829119 Sep 6 01:22:39.089279 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 01:22:39.089295 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:22:39.089310 kernel: AVX version of gcm_enc/dec engaged. Sep 6 01:22:39.089326 kernel: AES CTR mode by8 optimization enabled Sep 6 01:22:39.089341 kernel: libata version 3.00 loaded. Sep 6 01:22:39.102450 kernel: ACPI: bus type USB registered Sep 6 01:22:39.102506 kernel: usbcore: registered new interface driver usbfs Sep 6 01:22:39.102526 kernel: usbcore: registered new interface driver hub Sep 6 01:22:39.102554 kernel: usbcore: registered new device driver usb Sep 6 01:22:39.107451 kernel: ahci 0000:00:1f.2: version 3.0 Sep 6 01:22:39.173698 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Sep 6 01:22:39.173725 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Sep 6 01:22:39.173917 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Sep 6 01:22:39.174118 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (450) Sep 6 01:22:39.174147 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 01:22:39.174330 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Sep 6 01:22:39.174528 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Sep 6 01:22:39.174731 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 01:22:39.174929 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Sep 6 01:22:39.175137 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Sep 6 01:22:39.175325 kernel: hub 1-0:1.0: USB hub found Sep 6 01:22:39.175555 kernel: hub 1-0:1.0: 4 ports detected Sep 6 01:22:39.175789 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Sep 6 01:22:39.176130 kernel: hub 2-0:1.0: USB hub found Sep 6 01:22:39.176337 kernel: hub 2-0:1.0: 4 ports detected Sep 6 01:22:39.176600 kernel: scsi host0: ahci Sep 6 01:22:39.176837 kernel: scsi host1: ahci Sep 6 01:22:39.177040 kernel: scsi host2: ahci Sep 6 01:22:39.177241 kernel: scsi host3: ahci Sep 6 01:22:39.177500 kernel: scsi host4: ahci Sep 6 01:22:39.177699 kernel: scsi host5: ahci Sep 6 01:22:39.177933 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Sep 6 01:22:39.177953 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Sep 6 01:22:39.177970 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Sep 6 01:22:39.177993 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Sep 6 01:22:39.178010 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Sep 6 01:22:39.178026 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Sep 6 01:22:39.139424 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 01:22:39.266004 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 01:22:39.266833 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 01:22:39.276849 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 01:22:39.285709 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:22:39.287736 systemd[1]: Starting disk-uuid.service... Sep 6 01:22:39.294912 disk-uuid[528]: Primary Header is updated. Sep 6 01:22:39.294912 disk-uuid[528]: Secondary Entries is updated. Sep 6 01:22:39.294912 disk-uuid[528]: Secondary Header is updated. Sep 6 01:22:39.299464 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:22:39.306482 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:22:39.312460 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:22:39.389538 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Sep 6 01:22:39.486167 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 6 01:22:39.486256 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 6 01:22:39.486276 kernel: ata2: SATA link down (SStatus 0 SControl 300) Sep 6 01:22:39.490905 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 6 01:22:39.490955 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 6 01:22:39.493096 kernel: ata1: SATA link down (SStatus 0 SControl 300) Sep 6 01:22:39.531472 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 01:22:39.538045 kernel: usbcore: registered new interface driver usbhid Sep 6 01:22:39.538103 kernel: usbhid: USB HID core driver Sep 6 01:22:39.544456 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Sep 6 01:22:39.544510 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Sep 6 01:22:40.311927 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:22:40.312767 disk-uuid[529]: The operation has completed successfully. Sep 6 01:22:40.369670 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 01:22:40.370859 systemd[1]: Finished disk-uuid.service. Sep 6 01:22:40.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.373387 systemd[1]: Starting verity-setup.service... Sep 6 01:22:40.396486 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Sep 6 01:22:40.454304 systemd[1]: Found device dev-mapper-usr.device. Sep 6 01:22:40.457046 systemd[1]: Mounting sysusr-usr.mount... Sep 6 01:22:40.458908 systemd[1]: Finished verity-setup.service. Sep 6 01:22:40.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.555450 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 01:22:40.556181 systemd[1]: Mounted sysusr-usr.mount. Sep 6 01:22:40.557016 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 01:22:40.558039 systemd[1]: Starting ignition-setup.service... Sep 6 01:22:40.560693 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 01:22:40.577722 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 01:22:40.577773 kernel: BTRFS info (device vda6): using free space tree Sep 6 01:22:40.577792 kernel: BTRFS info (device vda6): has skinny extents Sep 6 01:22:40.598625 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 01:22:40.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.606530 systemd[1]: Finished ignition-setup.service. Sep 6 01:22:40.608197 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 01:22:40.727203 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 01:22:40.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.732000 audit: BPF prog-id=9 op=LOAD Sep 6 01:22:40.736069 systemd[1]: Starting systemd-networkd.service... Sep 6 01:22:40.806278 systemd-networkd[705]: lo: Link UP Sep 6 01:22:40.807425 systemd-networkd[705]: lo: Gained carrier Sep 6 01:22:40.809113 systemd-networkd[705]: Enumeration completed Sep 6 01:22:40.809961 systemd[1]: Started systemd-networkd.service. Sep 6 01:22:40.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.810792 systemd[1]: Reached target network.target. Sep 6 01:22:40.811470 systemd-networkd[705]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:22:40.826467 systemd-networkd[705]: eth0: Link UP Sep 6 01:22:40.826474 systemd-networkd[705]: eth0: Gained carrier Sep 6 01:22:40.828714 systemd[1]: Starting iscsiuio.service... Sep 6 01:22:40.880624 systemd-networkd[705]: eth0: DHCPv4 address 10.230.79.10/30, gateway 10.230.79.9 acquired from 10.230.79.9 Sep 6 01:22:40.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.883143 systemd[1]: Started iscsiuio.service. Sep 6 01:22:40.885108 systemd[1]: Starting iscsid.service... Sep 6 01:22:40.892107 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:22:40.892107 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 01:22:40.892107 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 01:22:40.892107 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 01:22:40.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.902441 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:22:40.902441 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 01:22:40.895698 systemd[1]: Started iscsid.service. Sep 6 01:22:40.898379 systemd[1]: Starting dracut-initqueue.service... Sep 6 01:22:40.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.919169 systemd[1]: Finished dracut-initqueue.service. Sep 6 01:22:40.920063 systemd[1]: Reached target remote-fs-pre.target. Sep 6 01:22:40.920679 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:22:40.921271 systemd[1]: Reached target remote-fs.target. Sep 6 01:22:40.923403 systemd[1]: Starting dracut-pre-mount.service... Sep 6 01:22:40.937970 systemd[1]: Finished dracut-pre-mount.service. Sep 6 01:22:40.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.956222 ignition[631]: Ignition 2.14.0 Sep 6 01:22:40.956243 ignition[631]: Stage: fetch-offline Sep 6 01:22:40.956383 ignition[631]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:40.956473 ignition[631]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:40.958300 ignition[631]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:40.958494 ignition[631]: parsed url from cmdline: "" Sep 6 01:22:40.959879 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 01:22:40.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:40.958502 ignition[631]: no config URL provided Sep 6 01:22:40.958512 ignition[631]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:22:40.961819 systemd[1]: Starting ignition-fetch.service... Sep 6 01:22:40.958529 ignition[631]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:22:40.958538 ignition[631]: failed to fetch config: resource requires networking Sep 6 01:22:40.958920 ignition[631]: Ignition finished successfully Sep 6 01:22:40.976468 ignition[729]: Ignition 2.14.0 Sep 6 01:22:40.976487 ignition[729]: Stage: fetch Sep 6 01:22:40.976659 ignition[729]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:40.976705 ignition[729]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:40.978019 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:40.978175 ignition[729]: parsed url from cmdline: "" Sep 6 01:22:40.978183 ignition[729]: no config URL provided Sep 6 01:22:40.978193 ignition[729]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:22:40.978209 ignition[729]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:22:40.983130 ignition[729]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Sep 6 01:22:40.983174 ignition[729]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Sep 6 01:22:40.983990 ignition[729]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Sep 6 01:22:41.009361 ignition[729]: GET result: OK Sep 6 01:22:41.009694 ignition[729]: parsing config with SHA512: 48ffef0613bb0ac2d408bde364d0260a2a3a51e2de78f2c52a66eb561423c3885e706310397d335ec72184e45c426f98c9e10c68fdea21f7f445c9cdc7a68b50 Sep 6 01:22:41.022473 unknown[729]: fetched base config from "system" Sep 6 01:22:41.022493 unknown[729]: fetched base config from "system" Sep 6 01:22:41.023111 ignition[729]: fetch: fetch complete Sep 6 01:22:41.022503 unknown[729]: fetched user config from "openstack" Sep 6 01:22:41.023121 ignition[729]: fetch: fetch passed Sep 6 01:22:41.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.024982 systemd[1]: Finished ignition-fetch.service. Sep 6 01:22:41.023190 ignition[729]: Ignition finished successfully Sep 6 01:22:41.027370 systemd[1]: Starting ignition-kargs.service... Sep 6 01:22:41.040360 ignition[735]: Ignition 2.14.0 Sep 6 01:22:41.040384 ignition[735]: Stage: kargs Sep 6 01:22:41.040562 ignition[735]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:41.040598 ignition[735]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:41.041993 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:41.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.043494 ignition[735]: kargs: kargs passed Sep 6 01:22:41.044542 systemd[1]: Finished ignition-kargs.service. Sep 6 01:22:41.043573 ignition[735]: Ignition finished successfully Sep 6 01:22:41.046628 systemd[1]: Starting ignition-disks.service... Sep 6 01:22:41.061782 ignition[740]: Ignition 2.14.0 Sep 6 01:22:41.061803 ignition[740]: Stage: disks Sep 6 01:22:41.062032 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:41.062081 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:41.063810 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:41.065888 ignition[740]: disks: disks passed Sep 6 01:22:41.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.066885 systemd[1]: Finished ignition-disks.service. Sep 6 01:22:41.065978 ignition[740]: Ignition finished successfully Sep 6 01:22:41.067671 systemd[1]: Reached target initrd-root-device.target. Sep 6 01:22:41.068335 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:22:41.068974 systemd[1]: Reached target local-fs.target. Sep 6 01:22:41.069582 systemd[1]: Reached target sysinit.target. Sep 6 01:22:41.070702 systemd[1]: Reached target basic.target. Sep 6 01:22:41.073124 systemd[1]: Starting systemd-fsck-root.service... Sep 6 01:22:41.096807 systemd-fsck[747]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 6 01:22:41.103753 systemd[1]: Finished systemd-fsck-root.service. Sep 6 01:22:41.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.105984 systemd[1]: Mounting sysroot.mount... Sep 6 01:22:41.121475 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 01:22:41.121926 systemd[1]: Mounted sysroot.mount. Sep 6 01:22:41.122745 systemd[1]: Reached target initrd-root-fs.target. Sep 6 01:22:41.125337 systemd[1]: Mounting sysroot-usr.mount... Sep 6 01:22:41.126610 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 01:22:41.127639 systemd[1]: Starting flatcar-openstack-hostname.service... Sep 6 01:22:41.130839 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 01:22:41.130887 systemd[1]: Reached target ignition-diskful.target. Sep 6 01:22:41.136025 systemd[1]: Mounted sysroot-usr.mount. Sep 6 01:22:41.138763 systemd[1]: Starting initrd-setup-root.service... Sep 6 01:22:41.145888 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 01:22:41.160578 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory Sep 6 01:22:41.170506 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 01:22:41.180836 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 01:22:41.253083 systemd[1]: Finished initrd-setup-root.service. Sep 6 01:22:41.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.255214 systemd[1]: Starting ignition-mount.service... Sep 6 01:22:41.257265 systemd[1]: Starting sysroot-boot.service... Sep 6 01:22:41.274387 bash[801]: umount: /sysroot/usr/share/oem: not mounted. Sep 6 01:22:41.284084 coreos-metadata[753]: Sep 06 01:22:41.284 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 01:22:41.289243 ignition[803]: INFO : Ignition 2.14.0 Sep 6 01:22:41.289243 ignition[803]: INFO : Stage: mount Sep 6 01:22:41.290751 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:41.290751 ignition[803]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:41.292896 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:41.294259 ignition[803]: INFO : mount: mount passed Sep 6 01:22:41.294259 ignition[803]: INFO : Ignition finished successfully Sep 6 01:22:41.294270 systemd[1]: Finished ignition-mount.service. Sep 6 01:22:41.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.306923 systemd[1]: Finished sysroot-boot.service. Sep 6 01:22:41.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.310025 coreos-metadata[753]: Sep 06 01:22:41.308 INFO Fetch successful Sep 6 01:22:41.310025 coreos-metadata[753]: Sep 06 01:22:41.308 INFO wrote hostname srv-bf5vc.gb1.brightbox.com to /sysroot/etc/hostname Sep 6 01:22:41.312205 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Sep 6 01:22:41.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:41.312339 systemd[1]: Finished flatcar-openstack-hostname.service. Sep 6 01:22:41.478659 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 01:22:41.493460 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (811) Sep 6 01:22:41.498468 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 01:22:41.498507 kernel: BTRFS info (device vda6): using free space tree Sep 6 01:22:41.498526 kernel: BTRFS info (device vda6): has skinny extents Sep 6 01:22:41.504588 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 01:22:41.507139 systemd[1]: Starting ignition-files.service... Sep 6 01:22:41.528735 ignition[831]: INFO : Ignition 2.14.0 Sep 6 01:22:41.528735 ignition[831]: INFO : Stage: files Sep 6 01:22:41.530372 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:41.530372 ignition[831]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:41.530372 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:41.533600 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Sep 6 01:22:41.533600 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 01:22:41.533600 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 01:22:41.536567 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 01:22:41.537610 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 01:22:41.538882 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 01:22:41.538605 unknown[831]: wrote ssh authorized keys file for user: core Sep 6 01:22:41.541794 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Sep 6 01:22:41.541794 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Sep 6 01:22:41.702452 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Sep 6 01:22:41.995717 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Sep 6 01:22:41.997179 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 6 01:22:41.997179 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 01:22:41.997179 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:22:42.000309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Sep 6 01:22:42.409838 systemd-networkd[705]: eth0: Gained IPv6LL Sep 6 01:22:42.535251 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Sep 6 01:22:42.978902 systemd-networkd[705]: eth0: Ignoring DHCPv6 address 2a02:1348:179:93c2:24:19ff:fee6:4f0a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:93c2:24:19ff:fee6:4f0a/64 assigned by NDisc. Sep 6 01:22:42.978919 systemd-networkd[705]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 01:22:46.002231 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Sep 6 01:22:46.002231 ignition[831]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 01:22:46.002231 ignition[831]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 01:22:46.002231 ignition[831]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Sep 6 01:22:46.013754 ignition[831]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Sep 6 01:22:46.021315 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:22:46.021315 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:22:46.021315 ignition[831]: INFO : files: files passed Sep 6 01:22:46.021315 ignition[831]: INFO : Ignition finished successfully Sep 6 01:22:46.037999 kernel: kauditd_printk_skb: 28 callbacks suppressed Sep 6 01:22:46.038074 kernel: audit: type=1130 audit(1757121766.022:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.021071 systemd[1]: Finished ignition-files.service. Sep 6 01:22:46.025294 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 01:22:46.031504 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 01:22:46.033033 systemd[1]: Starting ignition-quench.service... Sep 6 01:22:46.040766 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 01:22:46.053304 kernel: audit: type=1130 audit(1757121766.042:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.053355 kernel: audit: type=1131 audit(1757121766.043:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.053500 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 01:22:46.059671 kernel: audit: type=1130 audit(1757121766.053:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.040911 systemd[1]: Finished ignition-quench.service. Sep 6 01:22:46.048882 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 01:22:46.054169 systemd[1]: Reached target ignition-complete.target. Sep 6 01:22:46.061406 systemd[1]: Starting initrd-parse-etc.service... Sep 6 01:22:46.081957 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 01:22:46.092687 kernel: audit: type=1130 audit(1757121766.082:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.092732 kernel: audit: type=1131 audit(1757121766.082:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.082109 systemd[1]: Finished initrd-parse-etc.service. Sep 6 01:22:46.082996 systemd[1]: Reached target initrd-fs.target. Sep 6 01:22:46.093274 systemd[1]: Reached target initrd.target. Sep 6 01:22:46.094510 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 01:22:46.095919 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 01:22:46.112104 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 01:22:46.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.114896 systemd[1]: Starting initrd-cleanup.service... Sep 6 01:22:46.119862 kernel: audit: type=1130 audit(1757121766.113:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.128598 systemd[1]: Stopped target nss-lookup.target. Sep 6 01:22:46.129395 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 01:22:46.144080 systemd[1]: Stopped target timers.target. Sep 6 01:22:46.145143 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 01:22:46.151309 kernel: audit: type=1131 audit(1757121766.145:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.145377 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 01:22:46.146640 systemd[1]: Stopped target initrd.target. Sep 6 01:22:46.152146 systemd[1]: Stopped target basic.target. Sep 6 01:22:46.153379 systemd[1]: Stopped target ignition-complete.target. Sep 6 01:22:46.154528 systemd[1]: Stopped target ignition-diskful.target. Sep 6 01:22:46.155780 systemd[1]: Stopped target initrd-root-device.target. Sep 6 01:22:46.157063 systemd[1]: Stopped target remote-fs.target. Sep 6 01:22:46.158302 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 01:22:46.159645 systemd[1]: Stopped target sysinit.target. Sep 6 01:22:46.160891 systemd[1]: Stopped target local-fs.target. Sep 6 01:22:46.162014 systemd[1]: Stopped target local-fs-pre.target. Sep 6 01:22:46.163211 systemd[1]: Stopped target swap.target. Sep 6 01:22:46.170491 kernel: audit: type=1131 audit(1757121766.165:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.164252 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 01:22:46.164530 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 01:22:46.177467 kernel: audit: type=1131 audit(1757121766.172:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.165718 systemd[1]: Stopped target cryptsetup.target. Sep 6 01:22:46.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.171169 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 01:22:46.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.171419 systemd[1]: Stopped dracut-initqueue.service. Sep 6 01:22:46.172606 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 01:22:46.172832 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 01:22:46.178369 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 01:22:46.178603 systemd[1]: Stopped ignition-files.service. Sep 6 01:22:46.181026 systemd[1]: Stopping ignition-mount.service... Sep 6 01:22:46.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.189886 systemd[1]: Stopping sysroot-boot.service... Sep 6 01:22:46.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.191909 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 01:22:46.192207 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 01:22:46.193155 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 01:22:46.202859 ignition[869]: INFO : Ignition 2.14.0 Sep 6 01:22:46.202859 ignition[869]: INFO : Stage: umount Sep 6 01:22:46.202859 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:22:46.202859 ignition[869]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:22:46.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.193396 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 01:22:46.209873 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:22:46.209873 ignition[869]: INFO : umount: umount passed Sep 6 01:22:46.209873 ignition[869]: INFO : Ignition finished successfully Sep 6 01:22:46.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.200611 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 01:22:46.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.200760 systemd[1]: Finished initrd-cleanup.service. Sep 6 01:22:46.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.210890 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 01:22:46.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.211044 systemd[1]: Stopped ignition-mount.service. Sep 6 01:22:46.212072 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 01:22:46.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.212166 systemd[1]: Stopped ignition-disks.service. Sep 6 01:22:46.214410 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 01:22:46.214525 systemd[1]: Stopped ignition-kargs.service. Sep 6 01:22:46.215641 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 01:22:46.215699 systemd[1]: Stopped ignition-fetch.service. Sep 6 01:22:46.216775 systemd[1]: Stopped target network.target. Sep 6 01:22:46.217893 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 01:22:46.218011 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 01:22:46.219170 systemd[1]: Stopped target paths.target. Sep 6 01:22:46.220290 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 01:22:46.223512 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 01:22:46.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.224646 systemd[1]: Stopped target slices.target. Sep 6 01:22:46.225795 systemd[1]: Stopped target sockets.target. Sep 6 01:22:46.227499 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 01:22:46.227546 systemd[1]: Closed iscsid.socket. Sep 6 01:22:46.228637 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 01:22:46.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.228693 systemd[1]: Closed iscsiuio.socket. Sep 6 01:22:46.229749 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 01:22:46.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.229837 systemd[1]: Stopped ignition-setup.service. Sep 6 01:22:46.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.231379 systemd[1]: Stopping systemd-networkd.service... Sep 6 01:22:46.233351 systemd[1]: Stopping systemd-resolved.service... Sep 6 01:22:46.248000 audit: BPF prog-id=6 op=UNLOAD Sep 6 01:22:46.235640 systemd-networkd[705]: eth0: DHCPv6 lease lost Sep 6 01:22:46.248000 audit: BPF prog-id=9 op=UNLOAD Sep 6 01:22:46.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.238268 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 01:22:46.238959 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 01:22:46.239137 systemd[1]: Stopped systemd-networkd.service. Sep 6 01:22:46.241956 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 01:22:46.242071 systemd[1]: Stopped sysroot-boot.service. Sep 6 01:22:46.245375 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 01:22:46.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.245558 systemd[1]: Stopped systemd-resolved.service. Sep 6 01:22:46.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.247413 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 01:22:46.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.247522 systemd[1]: Closed systemd-networkd.socket. Sep 6 01:22:46.248689 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 01:22:46.248761 systemd[1]: Stopped initrd-setup-root.service. Sep 6 01:22:46.250900 systemd[1]: Stopping network-cleanup.service... Sep 6 01:22:46.254170 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 01:22:46.254255 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 01:22:46.255588 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 01:22:46.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.255652 systemd[1]: Stopped systemd-sysctl.service. Sep 6 01:22:46.257320 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 01:22:46.257380 systemd[1]: Stopped systemd-modules-load.service. Sep 6 01:22:46.258658 systemd[1]: Stopping systemd-udevd.service... Sep 6 01:22:46.262317 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 01:22:46.263136 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 01:22:46.263385 systemd[1]: Stopped systemd-udevd.service. Sep 6 01:22:46.265892 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 01:22:46.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.266027 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 01:22:46.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.269695 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 01:22:46.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.269743 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 01:22:46.270884 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 01:22:46.270961 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 01:22:46.272189 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 01:22:46.272261 systemd[1]: Stopped dracut-cmdline.service. Sep 6 01:22:46.273505 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 01:22:46.273582 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 01:22:46.275826 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 01:22:46.283554 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 01:22:46.283645 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 01:22:46.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.298934 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 01:22:46.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.299029 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 01:22:46.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.299878 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 01:22:46.299954 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 01:22:46.302630 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 01:22:46.303489 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 01:22:46.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.303640 systemd[1]: Stopped network-cleanup.service. Sep 6 01:22:46.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.305350 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 01:22:46.305495 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 01:22:46.306409 systemd[1]: Reached target initrd-switch-root.target. Sep 6 01:22:46.308602 systemd[1]: Starting initrd-switch-root.service... Sep 6 01:22:46.324747 systemd[1]: Switching root. Sep 6 01:22:46.347272 iscsid[715]: iscsid shutting down. Sep 6 01:22:46.348045 systemd-journald[201]: Received SIGTERM from PID 1 (n/a). Sep 6 01:22:46.348146 systemd-journald[201]: Journal stopped Sep 6 01:22:51.238632 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 01:22:51.238723 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 01:22:51.238748 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 01:22:51.238768 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 01:22:51.238787 kernel: SELinux: policy capability open_perms=1 Sep 6 01:22:51.238805 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 01:22:51.238836 kernel: SELinux: policy capability always_check_network=0 Sep 6 01:22:51.238891 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 01:22:51.238927 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 01:22:51.238948 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 01:22:51.238966 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 01:22:51.238994 systemd[1]: Successfully loaded SELinux policy in 62.644ms. Sep 6 01:22:51.239028 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.421ms. Sep 6 01:22:51.239050 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:22:51.239071 systemd[1]: Detected virtualization kvm. Sep 6 01:22:51.244560 systemd[1]: Detected architecture x86-64. Sep 6 01:22:51.244590 systemd[1]: Detected first boot. Sep 6 01:22:51.244618 systemd[1]: Hostname set to . Sep 6 01:22:51.244639 systemd[1]: Initializing machine ID from VM UUID. Sep 6 01:22:51.244664 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 01:22:51.244703 systemd[1]: Populated /etc with preset unit settings. Sep 6 01:22:51.244725 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:22:51.244755 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:22:51.244784 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:22:51.244807 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 01:22:51.244841 systemd[1]: Stopped iscsiuio.service. Sep 6 01:22:51.244875 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 01:22:51.244898 systemd[1]: Stopped iscsid.service. Sep 6 01:22:51.244919 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 01:22:51.244939 systemd[1]: Stopped initrd-switch-root.service. Sep 6 01:22:51.244959 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 01:22:51.244980 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 01:22:51.245000 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 01:22:51.245020 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 01:22:51.245040 systemd[1]: Created slice system-getty.slice. Sep 6 01:22:51.245073 systemd[1]: Created slice system-modprobe.slice. Sep 6 01:22:51.245096 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 01:22:51.245117 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 01:22:51.245137 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 01:22:51.245164 systemd[1]: Created slice user.slice. Sep 6 01:22:51.245201 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:22:51.245245 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 01:22:51.245267 systemd[1]: Set up automount boot.automount. Sep 6 01:22:51.245287 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 01:22:51.245322 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 01:22:51.245343 systemd[1]: Stopped target initrd-fs.target. Sep 6 01:22:51.245363 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 01:22:51.245395 systemd[1]: Reached target integritysetup.target. Sep 6 01:22:51.245414 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:22:51.245447 systemd[1]: Reached target remote-fs.target. Sep 6 01:22:51.245498 systemd[1]: Reached target slices.target. Sep 6 01:22:51.245522 systemd[1]: Reached target swap.target. Sep 6 01:22:51.245542 systemd[1]: Reached target torcx.target. Sep 6 01:22:51.245579 systemd[1]: Reached target veritysetup.target. Sep 6 01:22:51.245602 systemd[1]: Listening on systemd-coredump.socket. Sep 6 01:22:51.245622 systemd[1]: Listening on systemd-initctl.socket. Sep 6 01:22:51.245642 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:22:51.245671 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:22:51.245693 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:22:51.245714 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 01:22:51.245745 systemd[1]: Mounting dev-hugepages.mount... Sep 6 01:22:51.245782 systemd[1]: Mounting dev-mqueue.mount... Sep 6 01:22:51.245802 systemd[1]: Mounting media.mount... Sep 6 01:22:51.245841 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:22:51.245863 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 01:22:51.245883 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 01:22:51.245922 systemd[1]: Mounting tmp.mount... Sep 6 01:22:51.245944 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 01:22:51.245965 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:22:51.245998 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:22:51.246030 systemd[1]: Starting modprobe@configfs.service... Sep 6 01:22:51.246052 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:22:51.246073 systemd[1]: Starting modprobe@drm.service... Sep 6 01:22:51.246092 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:22:51.246112 systemd[1]: Starting modprobe@fuse.service... Sep 6 01:22:51.246131 systemd[1]: Starting modprobe@loop.service... Sep 6 01:22:51.246151 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 01:22:51.246172 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 01:22:51.246204 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 01:22:51.246226 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 01:22:51.246246 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 01:22:51.246266 systemd[1]: Stopped systemd-journald.service. Sep 6 01:22:51.246285 kernel: fuse: init (API version 7.34) Sep 6 01:22:51.246305 systemd[1]: Starting systemd-journald.service... Sep 6 01:22:51.246325 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:22:51.246344 systemd[1]: Starting systemd-network-generator.service... Sep 6 01:22:51.246363 systemd[1]: Starting systemd-remount-fs.service... Sep 6 01:22:51.246416 kernel: loop: module loaded Sep 6 01:22:51.246461 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:22:51.246481 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 01:22:51.246525 systemd[1]: Stopped verity-setup.service. Sep 6 01:22:51.246546 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 6 01:22:51.246577 kernel: audit: type=1131 audit(1757121771.035:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.246597 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:22:51.246617 systemd[1]: Mounted dev-hugepages.mount. Sep 6 01:22:51.246637 systemd[1]: Mounted dev-mqueue.mount. Sep 6 01:22:51.246682 systemd[1]: Mounted media.mount. Sep 6 01:22:51.246706 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 01:22:51.246726 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 01:22:51.246746 systemd[1]: Mounted tmp.mount. Sep 6 01:22:51.246766 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:22:51.246805 kernel: audit: type=1130 audit(1757121771.168:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.246868 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 01:22:51.246891 systemd[1]: Finished modprobe@configfs.service. Sep 6 01:22:51.246911 kernel: audit: type=1130 audit(1757121771.177:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.246931 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:22:51.246951 kernel: audit: type=1131 audit(1757121771.178:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.246970 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:22:51.247016 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:22:51.247039 kernel: audit: type=1130 audit(1757121771.192:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247059 systemd[1]: Finished modprobe@drm.service. Sep 6 01:22:51.247080 kernel: audit: type=1131 audit(1757121771.192:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247099 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:22:51.247119 kernel: audit: type=1130 audit(1757121771.207:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247139 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:22:51.247158 kernel: audit: type=1131 audit(1757121771.207:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247191 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 01:22:51.247213 systemd[1]: Finished modprobe@fuse.service. Sep 6 01:22:51.247234 kernel: audit: type=1130 audit(1757121771.224:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247270 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:22:51.247292 systemd[1]: Finished modprobe@loop.service. Sep 6 01:22:51.247312 kernel: audit: type=1131 audit(1757121771.224:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247331 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 01:22:51.247354 systemd-journald[983]: Journal started Sep 6 01:22:51.247483 systemd-journald[983]: Runtime Journal (/run/log/journal/9d9ac96b03c245178e7abbf7ea95e22d) is 4.7M, max 38.1M, 33.3M free. Sep 6 01:22:46.515000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 01:22:46.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:22:46.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:22:46.603000 audit: BPF prog-id=10 op=LOAD Sep 6 01:22:46.603000 audit: BPF prog-id=10 op=UNLOAD Sep 6 01:22:46.603000 audit: BPF prog-id=11 op=LOAD Sep 6 01:22:46.603000 audit: BPF prog-id=11 op=UNLOAD Sep 6 01:22:46.725000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 01:22:46.725000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00019a0bc a1=c0001b6000 a2=c0001b4000 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:22:46.725000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:22:46.728000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 01:22:46.728000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00019a195 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:22:46.728000 audit: CWD cwd="/" Sep 6 01:22:46.728000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:46.728000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:46.728000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:22:50.796000 audit: BPF prog-id=12 op=LOAD Sep 6 01:22:50.797000 audit: BPF prog-id=3 op=UNLOAD Sep 6 01:22:50.797000 audit: BPF prog-id=13 op=LOAD Sep 6 01:22:50.797000 audit: BPF prog-id=14 op=LOAD Sep 6 01:22:50.797000 audit: BPF prog-id=4 op=UNLOAD Sep 6 01:22:50.797000 audit: BPF prog-id=5 op=UNLOAD Sep 6 01:22:50.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.811000 audit: BPF prog-id=12 op=UNLOAD Sep 6 01:22:50.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:50.987000 audit: BPF prog-id=15 op=LOAD Sep 6 01:22:50.989000 audit: BPF prog-id=16 op=LOAD Sep 6 01:22:50.989000 audit: BPF prog-id=17 op=LOAD Sep 6 01:22:50.989000 audit: BPF prog-id=13 op=UNLOAD Sep 6 01:22:50.989000 audit: BPF prog-id=14 op=UNLOAD Sep 6 01:22:51.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.249457 systemd[1]: Started systemd-journald.service. Sep 6 01:22:51.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.227000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 01:22:51.227000 audit[983]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd2fc1b340 a2=4000 a3=7ffd2fc1b3dc items=0 ppid=1 pid=983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:22:51.227000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 01:22:51.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.719132 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:22:50.792351 systemd[1]: Queued start job for default target multi-user.target. Sep 6 01:22:46.719753 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:22:50.792378 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 6 01:22:46.719811 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:22:50.800523 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 01:22:51.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.719867 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 01:22:51.250355 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:22:46.719885 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 01:22:46.719955 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 01:22:51.252001 systemd[1]: Finished systemd-network-generator.service. Sep 6 01:22:46.719978 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 01:22:46.720362 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 01:22:46.720441 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:22:46.720471 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:22:46.722516 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 01:22:46.722579 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 01:22:46.722613 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 01:22:51.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:46.722641 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 01:22:46.722673 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 01:22:46.722700 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 01:22:50.195203 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:22:50.195735 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:22:50.195996 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:22:50.196392 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:22:50.196510 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 01:22:50.196737 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T01:22:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 01:22:51.256573 systemd[1]: Finished systemd-remount-fs.service. Sep 6 01:22:51.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.258345 systemd[1]: Reached target network-pre.target. Sep 6 01:22:51.261133 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 01:22:51.267642 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 01:22:51.270994 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 01:22:51.273307 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 01:22:51.278641 systemd[1]: Starting systemd-journal-flush.service... Sep 6 01:22:51.279414 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:22:51.283807 systemd[1]: Starting systemd-random-seed.service... Sep 6 01:22:51.284769 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:22:51.285751 systemd-journald[983]: Time spent on flushing to /var/log/journal/9d9ac96b03c245178e7abbf7ea95e22d is 66.894ms for 1295 entries. Sep 6 01:22:51.285751 systemd-journald[983]: System Journal (/var/log/journal/9d9ac96b03c245178e7abbf7ea95e22d) is 8.0M, max 584.8M, 576.8M free. Sep 6 01:22:51.381618 systemd-journald[983]: Received client request to flush runtime journal. Sep 6 01:22:51.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.288018 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:22:51.291995 systemd[1]: Starting systemd-sysusers.service... Sep 6 01:22:51.297238 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 01:22:51.302014 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 01:22:51.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.321785 systemd[1]: Finished systemd-random-seed.service. Sep 6 01:22:51.322635 systemd[1]: Reached target first-boot-complete.target. Sep 6 01:22:51.335509 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:22:51.350662 systemd[1]: Finished systemd-sysusers.service. Sep 6 01:22:51.353277 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:22:51.383619 systemd[1]: Finished systemd-journal-flush.service. Sep 6 01:22:51.418669 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:22:51.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.431067 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:22:51.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:51.433719 systemd[1]: Starting systemd-udev-settle.service... Sep 6 01:22:51.469183 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 01:22:52.017542 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 01:22:52.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.031000 audit: BPF prog-id=18 op=LOAD Sep 6 01:22:52.031000 audit: BPF prog-id=19 op=LOAD Sep 6 01:22:52.031000 audit: BPF prog-id=7 op=UNLOAD Sep 6 01:22:52.031000 audit: BPF prog-id=8 op=UNLOAD Sep 6 01:22:52.033691 systemd[1]: Starting systemd-udevd.service... Sep 6 01:22:52.062603 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Sep 6 01:22:52.094609 systemd[1]: Started systemd-udevd.service. Sep 6 01:22:52.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.100000 audit: BPF prog-id=20 op=LOAD Sep 6 01:22:52.102588 systemd[1]: Starting systemd-networkd.service... Sep 6 01:22:52.111000 audit: BPF prog-id=21 op=LOAD Sep 6 01:22:52.112000 audit: BPF prog-id=22 op=LOAD Sep 6 01:22:52.112000 audit: BPF prog-id=23 op=LOAD Sep 6 01:22:52.113634 systemd[1]: Starting systemd-userdbd.service... Sep 6 01:22:52.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.172307 systemd[1]: Started systemd-userdbd.service. Sep 6 01:22:52.179850 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 01:22:52.279049 systemd-networkd[1024]: lo: Link UP Sep 6 01:22:52.279520 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Sep 6 01:22:52.279064 systemd-networkd[1024]: lo: Gained carrier Sep 6 01:22:52.280587 systemd-networkd[1024]: Enumeration completed Sep 6 01:22:52.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.280721 systemd[1]: Started systemd-networkd.service. Sep 6 01:22:52.307469 kernel: ACPI: button: Power Button [PWRF] Sep 6 01:22:52.347472 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 01:22:52.356000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 01:22:52.356000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563b80884860 a1=338ec a2=7fbb58fb2bc5 a3=5 items=110 ppid=1014 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:22:52.356000 audit: CWD cwd="/" Sep 6 01:22:52.356000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=1 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=2 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=3 name=(null) inode=15795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=4 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=5 name=(null) inode=15796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=6 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=7 name=(null) inode=15797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=8 name=(null) inode=15797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=9 name=(null) inode=15798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=10 name=(null) inode=15797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=11 name=(null) inode=15799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=12 name=(null) inode=15797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=13 name=(null) inode=15800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=14 name=(null) inode=15797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=15 name=(null) inode=15801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=16 name=(null) inode=15797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=17 name=(null) inode=15802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=18 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=19 name=(null) inode=15803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=20 name=(null) inode=15803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=21 name=(null) inode=15804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=22 name=(null) inode=15803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=23 name=(null) inode=15805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=24 name=(null) inode=15803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=25 name=(null) inode=15806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=26 name=(null) inode=15803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=27 name=(null) inode=15807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=28 name=(null) inode=15803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=29 name=(null) inode=15808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=30 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=31 name=(null) inode=15809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=32 name=(null) inode=15809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=33 name=(null) inode=15810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=34 name=(null) inode=15809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=35 name=(null) inode=15811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=36 name=(null) inode=15809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=37 name=(null) inode=15812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=38 name=(null) inode=15809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=39 name=(null) inode=15813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=40 name=(null) inode=15809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=41 name=(null) inode=15814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=42 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=43 name=(null) inode=15815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=44 name=(null) inode=15815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=45 name=(null) inode=15816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=46 name=(null) inode=15815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=47 name=(null) inode=15817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=48 name=(null) inode=15815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=49 name=(null) inode=15818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=50 name=(null) inode=15815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=51 name=(null) inode=15819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=52 name=(null) inode=15815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=53 name=(null) inode=15820 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=55 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=56 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=57 name=(null) inode=15822 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=58 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=59 name=(null) inode=15823 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=60 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=61 name=(null) inode=15824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=62 name=(null) inode=15824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=63 name=(null) inode=15825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=64 name=(null) inode=15824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=65 name=(null) inode=15826 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=66 name=(null) inode=15824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=67 name=(null) inode=15827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=68 name=(null) inode=15824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=69 name=(null) inode=15828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=70 name=(null) inode=15824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=71 name=(null) inode=15829 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=72 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=73 name=(null) inode=15830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=74 name=(null) inode=15830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=75 name=(null) inode=15831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=76 name=(null) inode=15830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=77 name=(null) inode=15832 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=78 name=(null) inode=15830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=79 name=(null) inode=15833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=80 name=(null) inode=15830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=81 name=(null) inode=15834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=82 name=(null) inode=15830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=83 name=(null) inode=15835 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=84 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=85 name=(null) inode=15836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=86 name=(null) inode=15836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=87 name=(null) inode=15837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=88 name=(null) inode=15836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=89 name=(null) inode=15838 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=90 name=(null) inode=15836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=91 name=(null) inode=15839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=92 name=(null) inode=15836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=93 name=(null) inode=15840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=94 name=(null) inode=15836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=95 name=(null) inode=15841 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=96 name=(null) inode=15821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=97 name=(null) inode=15842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=98 name=(null) inode=15842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=99 name=(null) inode=15843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=100 name=(null) inode=15842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=101 name=(null) inode=15844 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=102 name=(null) inode=15842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=103 name=(null) inode=15845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=104 name=(null) inode=15842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=105 name=(null) inode=15846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=106 name=(null) inode=15842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=107 name=(null) inode=15847 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PATH item=109 name=(null) inode=15848 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:22:52.356000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 01:22:52.422472 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Sep 6 01:22:52.430755 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:22:52.434468 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Sep 6 01:22:52.452711 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 6 01:22:52.452970 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 6 01:22:52.442046 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:22:52.443497 systemd-networkd[1024]: eth0: Link UP Sep 6 01:22:52.443504 systemd-networkd[1024]: eth0: Gained carrier Sep 6 01:22:52.456648 systemd-networkd[1024]: eth0: DHCPv4 address 10.230.79.10/30, gateway 10.230.79.9 acquired from 10.230.79.9 Sep 6 01:22:52.590408 systemd[1]: Finished systemd-udev-settle.service. Sep 6 01:22:52.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.593176 systemd[1]: Starting lvm2-activation-early.service... Sep 6 01:22:52.624768 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:22:52.656809 systemd[1]: Finished lvm2-activation-early.service. Sep 6 01:22:52.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.657686 systemd[1]: Reached target cryptsetup.target. Sep 6 01:22:52.660057 systemd[1]: Starting lvm2-activation.service... Sep 6 01:22:52.666630 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:22:52.694881 systemd[1]: Finished lvm2-activation.service. Sep 6 01:22:52.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.695791 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:22:52.696443 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 01:22:52.696481 systemd[1]: Reached target local-fs.target. Sep 6 01:22:52.697077 systemd[1]: Reached target machines.target. Sep 6 01:22:52.699757 systemd[1]: Starting ldconfig.service... Sep 6 01:22:52.701065 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:22:52.701167 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:52.702713 systemd[1]: Starting systemd-boot-update.service... Sep 6 01:22:52.706955 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 01:22:52.713898 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 01:22:52.716215 systemd[1]: Starting systemd-sysext.service... Sep 6 01:22:52.729334 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Sep 6 01:22:52.731368 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 01:22:52.807637 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 01:22:52.887482 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 01:22:52.887762 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 01:22:52.891909 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 01:22:52.892787 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 01:22:52.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.909476 kernel: loop0: detected capacity change from 0 to 221472 Sep 6 01:22:52.914188 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 01:22:52.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:52.939524 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 01:22:52.960471 kernel: loop1: detected capacity change from 0 to 221472 Sep 6 01:22:52.981704 (sd-sysext)[1059]: Using extensions 'kubernetes'. Sep 6 01:22:52.984146 (sd-sysext)[1059]: Merged extensions into '/usr'. Sep 6 01:22:53.015966 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Sep 6 01:22:53.015966 systemd-fsck[1056]: /dev/vda1: 790 files, 120761/258078 clusters Sep 6 01:22:53.018297 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:22:53.021235 systemd[1]: Mounting usr-share-oem.mount... Sep 6 01:22:53.035866 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.041810 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:22:53.048105 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:22:53.050704 systemd[1]: Starting modprobe@loop.service... Sep 6 01:22:53.051488 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.051649 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:53.051827 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:22:53.058124 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 01:22:53.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.059567 systemd[1]: Mounted usr-share-oem.mount. Sep 6 01:22:53.061848 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:22:53.062074 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:22:53.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.063689 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:22:53.064013 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:22:53.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.066836 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:22:53.067025 systemd[1]: Finished modprobe@loop.service. Sep 6 01:22:53.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.076974 systemd[1]: Finished systemd-sysext.service. Sep 6 01:22:53.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.079521 systemd[1]: Mounting boot.mount... Sep 6 01:22:53.081780 systemd[1]: Starting ensure-sysext.service... Sep 6 01:22:53.082506 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:22:53.082629 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.085780 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 01:22:53.097511 systemd[1]: Reloading. Sep 6 01:22:53.136992 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 01:22:53.143702 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 01:22:53.160263 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 01:22:53.300671 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2025-09-06T01:22:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:22:53.302330 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2025-09-06T01:22:53Z" level=info msg="torcx already run" Sep 6 01:22:53.347336 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 01:22:53.423027 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:22:53.423067 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:22:53.450759 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:22:53.533000 audit: BPF prog-id=24 op=LOAD Sep 6 01:22:53.533000 audit: BPF prog-id=21 op=UNLOAD Sep 6 01:22:53.533000 audit: BPF prog-id=25 op=LOAD Sep 6 01:22:53.533000 audit: BPF prog-id=26 op=LOAD Sep 6 01:22:53.533000 audit: BPF prog-id=22 op=UNLOAD Sep 6 01:22:53.533000 audit: BPF prog-id=23 op=UNLOAD Sep 6 01:22:53.535000 audit: BPF prog-id=27 op=LOAD Sep 6 01:22:53.535000 audit: BPF prog-id=20 op=UNLOAD Sep 6 01:22:53.536000 audit: BPF prog-id=28 op=LOAD Sep 6 01:22:53.536000 audit: BPF prog-id=29 op=LOAD Sep 6 01:22:53.536000 audit: BPF prog-id=18 op=UNLOAD Sep 6 01:22:53.536000 audit: BPF prog-id=19 op=UNLOAD Sep 6 01:22:53.538000 audit: BPF prog-id=30 op=LOAD Sep 6 01:22:53.539000 audit: BPF prog-id=15 op=UNLOAD Sep 6 01:22:53.539000 audit: BPF prog-id=31 op=LOAD Sep 6 01:22:53.539000 audit: BPF prog-id=32 op=LOAD Sep 6 01:22:53.539000 audit: BPF prog-id=16 op=UNLOAD Sep 6 01:22:53.539000 audit: BPF prog-id=17 op=UNLOAD Sep 6 01:22:53.554491 systemd[1]: Finished ldconfig.service. Sep 6 01:22:53.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.557726 systemd[1]: Mounted boot.mount. Sep 6 01:22:53.576294 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.578392 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:22:53.585798 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:22:53.590587 systemd[1]: Starting modprobe@loop.service... Sep 6 01:22:53.591296 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.591501 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:53.592969 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:22:53.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.593206 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:22:53.594481 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:22:53.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.594680 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:22:53.595947 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:22:53.596124 systemd[1]: Finished modprobe@loop.service. Sep 6 01:22:53.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.597264 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:22:53.597420 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.599905 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.601877 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:22:53.606143 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:22:53.622622 systemd[1]: Starting modprobe@loop.service... Sep 6 01:22:53.623362 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.623559 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:53.625032 systemd[1]: Finished systemd-boot-update.service. Sep 6 01:22:53.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.626254 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:22:53.626473 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:22:53.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.627698 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:22:53.627888 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:22:53.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.629100 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:22:53.629263 systemd[1]: Finished modprobe@loop.service. Sep 6 01:22:53.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.633995 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.635997 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:22:53.639819 systemd[1]: Starting modprobe@drm.service... Sep 6 01:22:53.643374 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:22:53.645861 systemd[1]: Starting modprobe@loop.service... Sep 6 01:22:53.647481 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.647653 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:53.649874 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 01:22:53.656127 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:22:53.656340 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:22:53.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.657615 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:22:53.657807 systemd[1]: Finished modprobe@drm.service. Sep 6 01:22:53.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.660169 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:22:53.660360 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:22:53.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.661738 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:22:53.661982 systemd[1]: Finished modprobe@loop.service. Sep 6 01:22:53.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.665875 systemd[1]: Finished ensure-sysext.service. Sep 6 01:22:53.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.666700 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:22:53.666772 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.738023 systemd-networkd[1024]: eth0: Gained IPv6LL Sep 6 01:22:53.739647 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 01:22:53.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.742621 systemd[1]: Starting audit-rules.service... Sep 6 01:22:53.745405 systemd[1]: Starting clean-ca-certificates.service... Sep 6 01:22:53.750669 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 01:22:53.753000 audit: BPF prog-id=33 op=LOAD Sep 6 01:22:53.755714 systemd[1]: Starting systemd-resolved.service... Sep 6 01:22:53.759000 audit: BPF prog-id=34 op=LOAD Sep 6 01:22:53.761189 systemd[1]: Starting systemd-timesyncd.service... Sep 6 01:22:53.765326 systemd[1]: Starting systemd-update-utmp.service... Sep 6 01:22:53.773192 systemd[1]: Finished clean-ca-certificates.service. Sep 6 01:22:53.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.774485 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 01:22:53.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.775414 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:22:53.790000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.794241 systemd[1]: Finished systemd-update-utmp.service. Sep 6 01:22:53.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.819055 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 01:22:53.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.821746 systemd[1]: Starting systemd-update-done.service... Sep 6 01:22:53.834933 systemd[1]: Finished systemd-update-done.service. Sep 6 01:22:53.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:22:53.850000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 01:22:53.850000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffedb848360 a2=420 a3=0 items=0 ppid=1145 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:22:53.850000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 01:22:53.850977 augenrules[1166]: No rules Sep 6 01:22:53.852048 systemd[1]: Finished audit-rules.service. Sep 6 01:22:53.873669 systemd[1]: Started systemd-timesyncd.service. Sep 6 01:22:53.874471 systemd[1]: Reached target time-set.target. Sep 6 01:22:53.880197 systemd-resolved[1149]: Positive Trust Anchors: Sep 6 01:22:53.880685 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:22:53.880883 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:22:53.885840 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:22:53.885884 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:22:53.889113 systemd-resolved[1149]: Using system hostname 'srv-bf5vc.gb1.brightbox.com'. Sep 6 01:22:53.891929 systemd[1]: Started systemd-resolved.service. Sep 6 01:22:53.892699 systemd[1]: Reached target network.target. Sep 6 01:22:53.893291 systemd[1]: Reached target network-online.target. Sep 6 01:22:53.893942 systemd[1]: Reached target nss-lookup.target. Sep 6 01:22:53.894530 systemd[1]: Reached target sysinit.target. Sep 6 01:22:53.895244 systemd[1]: Started motdgen.path. Sep 6 01:22:53.895869 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 01:22:53.896793 systemd[1]: Started logrotate.timer. Sep 6 01:22:53.897513 systemd[1]: Started mdadm.timer. Sep 6 01:22:53.898147 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 01:22:53.898781 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 01:22:53.898832 systemd[1]: Reached target paths.target. Sep 6 01:22:53.899468 systemd[1]: Reached target timers.target. Sep 6 01:22:53.900537 systemd[1]: Listening on dbus.socket. Sep 6 01:22:53.903066 systemd[1]: Starting docker.socket... Sep 6 01:22:53.907511 systemd[1]: Listening on sshd.socket. Sep 6 01:22:53.908249 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:53.908890 systemd[1]: Listening on docker.socket. Sep 6 01:22:53.909610 systemd[1]: Reached target sockets.target. Sep 6 01:22:53.910207 systemd[1]: Reached target basic.target. Sep 6 01:22:53.910986 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.911039 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:22:53.912692 systemd[1]: Starting containerd.service... Sep 6 01:22:53.916522 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 01:22:53.918814 systemd[1]: Starting dbus.service... Sep 6 01:22:53.921790 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 01:22:53.929540 systemd[1]: Starting extend-filesystems.service... Sep 6 01:22:53.932639 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 01:22:53.934998 systemd[1]: Starting kubelet.service... Sep 6 01:22:53.939865 systemd[1]: Starting motdgen.service... Sep 6 01:22:53.943283 systemd[1]: Starting prepare-helm.service... Sep 6 01:22:53.949803 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 01:22:53.954581 systemd[1]: Starting sshd-keygen.service... Sep 6 01:22:53.956400 jq[1178]: false Sep 6 01:22:53.967623 systemd[1]: Starting systemd-logind.service... Sep 6 01:22:53.968337 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:22:53.968499 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 01:22:53.969301 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 01:22:53.971389 systemd[1]: Starting update-engine.service... Sep 6 01:22:53.979184 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 01:22:53.987385 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 01:22:53.987846 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 01:22:53.992003 jq[1196]: true Sep 6 01:22:53.994278 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 01:22:53.994686 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 01:22:54.827284 systemd-resolved[1149]: Clock change detected. Flushing caches. Sep 6 01:22:54.827459 systemd-timesyncd[1150]: Contacted time server 193.57.144.50:123 (0.flatcar.pool.ntp.org). Sep 6 01:22:54.827563 systemd-timesyncd[1150]: Initial clock synchronization to Sat 2025-09-06 01:22:54.826895 UTC. Sep 6 01:22:54.845478 dbus-daemon[1176]: [system] SELinux support is enabled Sep 6 01:22:54.846610 jq[1200]: true Sep 6 01:22:54.847486 tar[1199]: linux-amd64/helm Sep 6 01:22:54.848512 systemd[1]: Started dbus.service. Sep 6 01:22:54.853575 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 01:22:54.853627 systemd[1]: Reached target system-config.target. Sep 6 01:22:54.854342 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 01:22:54.854376 systemd[1]: Reached target user-config.target. Sep 6 01:22:54.863652 extend-filesystems[1180]: Found loop1 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda1 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda2 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda3 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found usr Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda4 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda6 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda7 Sep 6 01:22:54.864781 extend-filesystems[1180]: Found vda9 Sep 6 01:22:54.864781 extend-filesystems[1180]: Checking size of /dev/vda9 Sep 6 01:22:54.880395 dbus-daemon[1176]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1024 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 01:22:54.886160 systemd[1]: Starting systemd-hostnamed.service... Sep 6 01:22:54.905657 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 01:22:54.906053 systemd[1]: Finished motdgen.service. Sep 6 01:22:54.951945 extend-filesystems[1180]: Resized partition /dev/vda9 Sep 6 01:22:54.978210 systemd[1]: Created slice system-sshd.slice. Sep 6 01:22:54.979011 extend-filesystems[1224]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 01:22:54.986670 update_engine[1191]: I0906 01:22:54.985860 1191 main.cc:92] Flatcar Update Engine starting Sep 6 01:22:54.988252 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Sep 6 01:22:54.995845 systemd[1]: Started update-engine.service. Sep 6 01:22:54.996062 update_engine[1191]: I0906 01:22:54.996023 1191 update_check_scheduler.cc:74] Next update check in 3m27s Sep 6 01:22:54.999341 systemd[1]: Started locksmithd.service. Sep 6 01:22:55.097449 bash[1229]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:22:55.098617 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 01:22:55.125460 systemd-logind[1190]: Watching system buttons on /dev/input/event2 (Power Button) Sep 6 01:22:55.126003 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 01:22:55.127284 systemd-logind[1190]: New seat seat0. Sep 6 01:22:55.133388 systemd[1]: Started systemd-logind.service. Sep 6 01:22:55.195281 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Sep 6 01:22:55.218417 extend-filesystems[1224]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 6 01:22:55.218417 extend-filesystems[1224]: old_desc_blocks = 1, new_desc_blocks = 8 Sep 6 01:22:55.218417 extend-filesystems[1224]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Sep 6 01:22:55.225113 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Sep 6 01:22:55.221088 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 01:22:55.221395 systemd[1]: Finished extend-filesystems.service. Sep 6 01:22:55.227583 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 01:22:55.227926 systemd[1]: Started systemd-hostnamed.service. Sep 6 01:22:55.231833 dbus-daemon[1176]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1210 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 01:22:55.237053 systemd[1]: Starting polkit.service... Sep 6 01:22:55.294905 polkitd[1237]: Started polkitd version 121 Sep 6 01:22:55.317445 env[1201]: time="2025-09-06T01:22:55.317319112Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 01:22:55.332342 polkitd[1237]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 01:22:55.409916 polkitd[1237]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 01:22:55.417258 polkitd[1237]: Finished loading, compiling and executing 2 rules Sep 6 01:22:55.418153 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 01:22:55.418406 systemd[1]: Started polkit.service. Sep 6 01:22:55.419146 polkitd[1237]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 01:22:55.442105 systemd-hostnamed[1210]: Hostname set to (static) Sep 6 01:22:55.450310 systemd-networkd[1024]: eth0: Ignoring DHCPv6 address 2a02:1348:179:93c2:24:19ff:fee6:4f0a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:93c2:24:19ff:fee6:4f0a/64 assigned by NDisc. Sep 6 01:22:55.450322 systemd-networkd[1024]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 01:22:55.470502 env[1201]: time="2025-09-06T01:22:55.470420492Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 01:22:55.474996 env[1201]: time="2025-09-06T01:22:55.474964924Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:22:55.477312 env[1201]: time="2025-09-06T01:22:55.477269327Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:22:55.479784 env[1201]: time="2025-09-06T01:22:55.479741639Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:22:55.480226 env[1201]: time="2025-09-06T01:22:55.480191248Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:22:55.480791 env[1201]: time="2025-09-06T01:22:55.480761000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 01:22:55.480937 env[1201]: time="2025-09-06T01:22:55.480906518Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 01:22:55.482788 env[1201]: time="2025-09-06T01:22:55.482760051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 01:22:55.483062 env[1201]: time="2025-09-06T01:22:55.483013492Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:22:55.483850 env[1201]: time="2025-09-06T01:22:55.483821450Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:22:55.484171 env[1201]: time="2025-09-06T01:22:55.484136066Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:22:55.484659 env[1201]: time="2025-09-06T01:22:55.484628441Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 01:22:55.486846 env[1201]: time="2025-09-06T01:22:55.486815011Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 01:22:55.486976 env[1201]: time="2025-09-06T01:22:55.486948031Z" level=info msg="metadata content store policy set" policy=shared Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.491863448Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.491903615Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.491925556Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492013680Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492058776Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492082869Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492103158Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492124162Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492143239Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492163808Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492185551Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492214213Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492373633Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 01:22:55.492739 env[1201]: time="2025-09-06T01:22:55.492566157Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 01:22:55.493671 env[1201]: time="2025-09-06T01:22:55.493640215Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 01:22:55.493855 env[1201]: time="2025-09-06T01:22:55.493824433Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.493997 env[1201]: time="2025-09-06T01:22:55.493968436Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 01:22:55.494223 env[1201]: time="2025-09-06T01:22:55.494192989Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.494339 env[1201]: time="2025-09-06T01:22:55.494311791Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.494502 env[1201]: time="2025-09-06T01:22:55.494471058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.494628 env[1201]: time="2025-09-06T01:22:55.494599060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.494791 env[1201]: time="2025-09-06T01:22:55.494762977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.494905 env[1201]: time="2025-09-06T01:22:55.494877819Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.495058 env[1201]: time="2025-09-06T01:22:55.495029052Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.495172 env[1201]: time="2025-09-06T01:22:55.495145050Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.495311 env[1201]: time="2025-09-06T01:22:55.495283045Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 01:22:55.495612 env[1201]: time="2025-09-06T01:22:55.495583073Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.495766 env[1201]: time="2025-09-06T01:22:55.495738250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.495891 env[1201]: time="2025-09-06T01:22:55.495863514Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.496065 env[1201]: time="2025-09-06T01:22:55.496032723Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 01:22:55.496187 env[1201]: time="2025-09-06T01:22:55.496156016Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 01:22:55.496293 env[1201]: time="2025-09-06T01:22:55.496266181Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 01:22:55.496460 env[1201]: time="2025-09-06T01:22:55.496428972Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 01:22:55.496621 env[1201]: time="2025-09-06T01:22:55.496592721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 01:22:55.497159 env[1201]: time="2025-09-06T01:22:55.497078142Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 01:22:55.501483 env[1201]: time="2025-09-06T01:22:55.497381631Z" level=info msg="Connect containerd service" Sep 6 01:22:55.501483 env[1201]: time="2025-09-06T01:22:55.497461873Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 01:22:55.501483 env[1201]: time="2025-09-06T01:22:55.498516569Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:22:55.501483 env[1201]: time="2025-09-06T01:22:55.499012490Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 01:22:55.501483 env[1201]: time="2025-09-06T01:22:55.499109238Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 01:22:55.501483 env[1201]: time="2025-09-06T01:22:55.499214592Z" level=info msg="containerd successfully booted in 0.196990s" Sep 6 01:22:55.499329 systemd[1]: Started containerd.service. Sep 6 01:22:55.506106 env[1201]: time="2025-09-06T01:22:55.506036432Z" level=info msg="Start subscribing containerd event" Sep 6 01:22:55.507531 env[1201]: time="2025-09-06T01:22:55.507493186Z" level=info msg="Start recovering state" Sep 6 01:22:55.507775 env[1201]: time="2025-09-06T01:22:55.507732465Z" level=info msg="Start event monitor" Sep 6 01:22:55.507866 env[1201]: time="2025-09-06T01:22:55.507797706Z" level=info msg="Start snapshots syncer" Sep 6 01:22:55.507866 env[1201]: time="2025-09-06T01:22:55.507828014Z" level=info msg="Start cni network conf syncer for default" Sep 6 01:22:55.507866 env[1201]: time="2025-09-06T01:22:55.507849995Z" level=info msg="Start streaming server" Sep 6 01:22:56.127647 tar[1199]: linux-amd64/LICENSE Sep 6 01:22:56.128439 tar[1199]: linux-amd64/README.md Sep 6 01:22:56.135079 systemd[1]: Finished prepare-helm.service. Sep 6 01:22:56.269528 locksmithd[1230]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 01:22:56.448915 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 01:22:56.490964 systemd[1]: Finished sshd-keygen.service. Sep 6 01:22:56.494688 systemd[1]: Starting issuegen.service... Sep 6 01:22:56.497980 systemd[1]: Started sshd@0-10.230.79.10:22-139.178.89.65:35234.service. Sep 6 01:22:56.510424 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 01:22:56.510655 systemd[1]: Finished issuegen.service. Sep 6 01:22:56.514127 systemd[1]: Starting systemd-user-sessions.service... Sep 6 01:22:56.528528 systemd[1]: Finished systemd-user-sessions.service. Sep 6 01:22:56.531705 systemd[1]: Started getty@tty1.service. Sep 6 01:22:56.534637 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 01:22:56.536063 systemd[1]: Reached target getty.target. Sep 6 01:22:57.291153 systemd[1]: Started kubelet.service. Sep 6 01:22:57.423783 sshd[1263]: Accepted publickey for core from 139.178.89.65 port 35234 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:22:57.425824 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:22:57.446899 systemd[1]: Created slice user-500.slice. Sep 6 01:22:57.460224 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 01:22:57.465663 systemd-logind[1190]: New session 1 of user core. Sep 6 01:22:57.479784 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 01:22:57.484044 systemd[1]: Starting user@500.service... Sep 6 01:22:57.492776 (systemd)[1278]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:22:57.618478 systemd[1278]: Queued start job for default target default.target. Sep 6 01:22:57.620678 systemd[1278]: Reached target paths.target. Sep 6 01:22:57.620912 systemd[1278]: Reached target sockets.target. Sep 6 01:22:57.621093 systemd[1278]: Reached target timers.target. Sep 6 01:22:57.621225 systemd[1278]: Reached target basic.target. Sep 6 01:22:57.621546 systemd[1]: Started user@500.service. Sep 6 01:22:57.624138 systemd[1]: Started session-1.scope. Sep 6 01:22:57.625422 systemd[1278]: Reached target default.target. Sep 6 01:22:57.625747 systemd[1278]: Startup finished in 122ms. Sep 6 01:22:58.059116 kubelet[1272]: E0906 01:22:58.059016 1272 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:22:58.060977 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:22:58.061202 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:22:58.061818 systemd[1]: kubelet.service: Consumed 1.630s CPU time. Sep 6 01:22:58.275637 systemd[1]: Started sshd@1-10.230.79.10:22-139.178.89.65:35244.service. Sep 6 01:22:59.184637 sshd[1288]: Accepted publickey for core from 139.178.89.65 port 35244 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:22:59.186921 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:22:59.194901 systemd-logind[1190]: New session 2 of user core. Sep 6 01:22:59.196063 systemd[1]: Started session-2.scope. Sep 6 01:22:59.812041 sshd[1288]: pam_unix(sshd:session): session closed for user core Sep 6 01:22:59.816052 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. Sep 6 01:22:59.817472 systemd[1]: sshd@1-10.230.79.10:22-139.178.89.65:35244.service: Deactivated successfully. Sep 6 01:22:59.818857 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 01:22:59.819554 systemd-logind[1190]: Removed session 2. Sep 6 01:22:59.962109 systemd[1]: Started sshd@2-10.230.79.10:22-139.178.89.65:35254.service. Sep 6 01:23:00.866581 sshd[1294]: Accepted publickey for core from 139.178.89.65 port 35254 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:00.868090 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:00.874871 systemd-logind[1190]: New session 3 of user core. Sep 6 01:23:00.875614 systemd[1]: Started session-3.scope. Sep 6 01:23:01.490297 sshd[1294]: pam_unix(sshd:session): session closed for user core Sep 6 01:23:01.494414 systemd[1]: sshd@2-10.230.79.10:22-139.178.89.65:35254.service: Deactivated successfully. Sep 6 01:23:01.495320 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 01:23:01.496195 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. Sep 6 01:23:01.497736 systemd-logind[1190]: Removed session 3. Sep 6 01:23:01.957294 coreos-metadata[1175]: Sep 06 01:23:01.957 WARN failed to locate config-drive, using the metadata service API instead Sep 6 01:23:02.011572 coreos-metadata[1175]: Sep 06 01:23:02.011 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Sep 6 01:23:02.051530 coreos-metadata[1175]: Sep 06 01:23:02.051 INFO Fetch successful Sep 6 01:23:02.051741 coreos-metadata[1175]: Sep 06 01:23:02.051 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 01:23:02.082993 coreos-metadata[1175]: Sep 06 01:23:02.082 INFO Fetch successful Sep 6 01:23:02.085126 unknown[1175]: wrote ssh authorized keys file for user: core Sep 6 01:23:02.098017 update-ssh-keys[1301]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:23:02.099344 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 01:23:02.100085 systemd[1]: Reached target multi-user.target. Sep 6 01:23:02.102292 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 01:23:02.113329 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 01:23:02.113579 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 01:23:02.116823 systemd[1]: Startup finished in 1.378s (kernel) + 8.645s (initrd) + 14.856s (userspace) = 24.881s. Sep 6 01:23:08.188921 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 01:23:08.189222 systemd[1]: Stopped kubelet.service. Sep 6 01:23:08.189306 systemd[1]: kubelet.service: Consumed 1.630s CPU time. Sep 6 01:23:08.191460 systemd[1]: Starting kubelet.service... Sep 6 01:23:08.535031 systemd[1]: Started kubelet.service. Sep 6 01:23:08.665449 kubelet[1307]: E0906 01:23:08.665341 1307 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:08.669570 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:08.669867 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:11.659733 systemd[1]: Started sshd@3-10.230.79.10:22-139.178.89.65:44938.service. Sep 6 01:23:12.623734 sshd[1314]: Accepted publickey for core from 139.178.89.65 port 44938 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:12.626493 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:12.633497 systemd-logind[1190]: New session 4 of user core. Sep 6 01:23:12.634323 systemd[1]: Started session-4.scope. Sep 6 01:23:13.291014 sshd[1314]: pam_unix(sshd:session): session closed for user core Sep 6 01:23:13.294873 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. Sep 6 01:23:13.295333 systemd[1]: sshd@3-10.230.79.10:22-139.178.89.65:44938.service: Deactivated successfully. Sep 6 01:23:13.296236 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 01:23:13.297644 systemd-logind[1190]: Removed session 4. Sep 6 01:23:13.431581 systemd[1]: Started sshd@4-10.230.79.10:22-139.178.89.65:44954.service. Sep 6 01:23:14.341078 sshd[1320]: Accepted publickey for core from 139.178.89.65 port 44954 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:14.343655 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:14.349780 systemd-logind[1190]: New session 5 of user core. Sep 6 01:23:14.350679 systemd[1]: Started session-5.scope. Sep 6 01:23:14.960314 sshd[1320]: pam_unix(sshd:session): session closed for user core Sep 6 01:23:14.963981 systemd[1]: sshd@4-10.230.79.10:22-139.178.89.65:44954.service: Deactivated successfully. Sep 6 01:23:14.964990 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 01:23:14.965940 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. Sep 6 01:23:14.967487 systemd-logind[1190]: Removed session 5. Sep 6 01:23:15.108955 systemd[1]: Started sshd@5-10.230.79.10:22-139.178.89.65:44968.service. Sep 6 01:23:16.006947 sshd[1326]: Accepted publickey for core from 139.178.89.65 port 44968 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:16.008790 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:16.015342 systemd-logind[1190]: New session 6 of user core. Sep 6 01:23:16.016214 systemd[1]: Started session-6.scope. Sep 6 01:23:16.630402 sshd[1326]: pam_unix(sshd:session): session closed for user core Sep 6 01:23:16.634196 systemd[1]: sshd@5-10.230.79.10:22-139.178.89.65:44968.service: Deactivated successfully. Sep 6 01:23:16.635158 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 01:23:16.636087 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. Sep 6 01:23:16.637681 systemd-logind[1190]: Removed session 6. Sep 6 01:23:16.780652 systemd[1]: Started sshd@6-10.230.79.10:22-139.178.89.65:44980.service. Sep 6 01:23:17.683705 sshd[1332]: Accepted publickey for core from 139.178.89.65 port 44980 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:17.685590 sshd[1332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:17.693399 systemd[1]: Started session-7.scope. Sep 6 01:23:17.695163 systemd-logind[1190]: New session 7 of user core. Sep 6 01:23:18.176976 sudo[1335]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 01:23:18.177348 sudo[1335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:23:18.186958 dbus-daemon[1176]: \xd0-\x8c\xe5\xe7U: received setenforce notice (enforcing=-1760901984) Sep 6 01:23:18.190426 sudo[1335]: pam_unix(sudo:session): session closed for user root Sep 6 01:23:18.336707 sshd[1332]: pam_unix(sshd:session): session closed for user core Sep 6 01:23:18.340892 systemd[1]: sshd@6-10.230.79.10:22-139.178.89.65:44980.service: Deactivated successfully. Sep 6 01:23:18.341896 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 01:23:18.342775 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. Sep 6 01:23:18.344525 systemd-logind[1190]: Removed session 7. Sep 6 01:23:18.484075 systemd[1]: Started sshd@7-10.230.79.10:22-139.178.89.65:44984.service. Sep 6 01:23:18.688916 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 01:23:18.690013 systemd[1]: Stopped kubelet.service. Sep 6 01:23:18.692765 systemd[1]: Starting kubelet.service... Sep 6 01:23:18.846982 systemd[1]: Started kubelet.service. Sep 6 01:23:18.899511 kubelet[1345]: E0906 01:23:18.899406 1345 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:18.901657 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:18.901918 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:19.385761 sshd[1339]: Accepted publickey for core from 139.178.89.65 port 44984 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:19.387290 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:19.394410 systemd-logind[1190]: New session 8 of user core. Sep 6 01:23:19.395286 systemd[1]: Started session-8.scope. Sep 6 01:23:19.865131 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 01:23:19.866176 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:23:19.871439 sudo[1352]: pam_unix(sudo:session): session closed for user root Sep 6 01:23:19.878998 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 01:23:19.879373 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:23:19.892531 systemd[1]: Stopping audit-rules.service... Sep 6 01:23:19.892000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:23:19.896145 auditctl[1355]: No rules Sep 6 01:23:19.897296 kernel: kauditd_printk_skb: 210 callbacks suppressed Sep 6 01:23:19.897462 kernel: audit: type=1305 audit(1757121799.892:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:23:19.898136 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 01:23:19.898612 systemd[1]: Stopped audit-rules.service. Sep 6 01:23:19.892000 audit[1355]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda7a97c70 a2=420 a3=0 items=0 ppid=1 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:19.903766 systemd[1]: Starting audit-rules.service... Sep 6 01:23:19.908766 kernel: audit: type=1300 audit(1757121799.892:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda7a97c70 a2=420 a3=0 items=0 ppid=1 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:19.892000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:23:19.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.915973 kernel: audit: type=1327 audit(1757121799.892:213): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:23:19.916068 kernel: audit: type=1131 audit(1757121799.896:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.932985 augenrules[1372]: No rules Sep 6 01:23:19.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.934520 systemd[1]: Finished audit-rules.service. Sep 6 01:23:19.940603 sudo[1351]: pam_unix(sudo:session): session closed for user root Sep 6 01:23:19.940932 kernel: audit: type=1130 audit(1757121799.933:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.938000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.939000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.952746 kernel: audit: type=1106 audit(1757121799.938:216): pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:19.952831 kernel: audit: type=1104 audit(1757121799.939:217): pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.090697 sshd[1339]: pam_unix(sshd:session): session closed for user core Sep 6 01:23:20.090000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:20.100446 systemd[1]: sshd@7-10.230.79.10:22-139.178.89.65:44984.service: Deactivated successfully. Sep 6 01:23:20.100979 kernel: audit: type=1106 audit(1757121800.090:218): pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:20.090000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:20.101596 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 01:23:20.107760 kernel: audit: type=1104 audit(1757121800.090:219): pid=1339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:20.107821 kernel: audit: type=1131 audit(1757121800.099:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.79.10:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.79.10:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:20.113803 systemd-logind[1190]: Session 8 logged out. Waiting for processes to exit. Sep 6 01:23:20.115071 systemd-logind[1190]: Removed session 8. Sep 6 01:23:20.326376 systemd[1]: Started sshd@8-10.230.79.10:22-139.178.89.65:41556.service. Sep 6 01:23:20.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.79.10:22-139.178.89.65:41556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.282000 audit[1378]: USER_ACCT pid=1378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:21.284732 sshd[1378]: Accepted publickey for core from 139.178.89.65 port 41556 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:23:21.284000 audit[1378]: CRED_ACQ pid=1378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:21.284000 audit[1378]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3590cfd0 a2=3 a3=0 items=0 ppid=1 pid=1378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:21.284000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:23:21.286598 sshd[1378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:23:21.293108 systemd-logind[1190]: New session 9 of user core. Sep 6 01:23:21.294059 systemd[1]: Started session-9.scope. Sep 6 01:23:21.299000 audit[1378]: USER_START pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:21.301000 audit[1380]: CRED_ACQ pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:23:21.791000 audit[1381]: USER_ACCT pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.793745 sudo[1381]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 01:23:21.792000 audit[1381]: CRED_REFR pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.794821 sudo[1381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:23:21.796000 audit[1381]: USER_START pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:23:21.841074 systemd[1]: Starting docker.service... Sep 6 01:23:21.928576 env[1391]: time="2025-09-06T01:23:21.928419006Z" level=info msg="Starting up" Sep 6 01:23:21.931065 env[1391]: time="2025-09-06T01:23:21.931027143Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 6 01:23:21.931209 env[1391]: time="2025-09-06T01:23:21.931178647Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 6 01:23:21.931393 env[1391]: time="2025-09-06T01:23:21.931357294Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 6 01:23:21.931542 env[1391]: time="2025-09-06T01:23:21.931511589Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 6 01:23:21.937736 env[1391]: time="2025-09-06T01:23:21.937663520Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 6 01:23:21.937736 env[1391]: time="2025-09-06T01:23:21.937698585Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 6 01:23:21.937902 env[1391]: time="2025-09-06T01:23:21.937740907Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 6 01:23:21.937902 env[1391]: time="2025-09-06T01:23:21.937758745Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 6 01:23:22.005831 env[1391]: time="2025-09-06T01:23:22.005768306Z" level=info msg="Loading containers: start." Sep 6 01:23:22.089000 audit[1423]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.089000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff6fad4b20 a2=0 a3=7fff6fad4b0c items=0 ppid=1391 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 6 01:23:22.093000 audit[1425]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.093000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd80a20520 a2=0 a3=7ffd80a2050c items=0 ppid=1391 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 6 01:23:22.095000 audit[1427]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.095000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc9d95a840 a2=0 a3=7ffc9d95a82c items=0 ppid=1391 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 6 01:23:22.098000 audit[1429]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.098000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd10b1e000 a2=0 a3=7ffd10b1dfec items=0 ppid=1391 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 6 01:23:22.102000 audit[1431]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.102000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff72b72b70 a2=0 a3=7fff72b72b5c items=0 ppid=1391 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 6 01:23:22.122000 audit[1436]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.122000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe4695abd0 a2=0 a3=7ffe4695abbc items=0 ppid=1391 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 6 01:23:22.131000 audit[1438]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.131000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeec42e990 a2=0 a3=7ffeec42e97c items=0 ppid=1391 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 6 01:23:22.135000 audit[1440]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.135000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdd56b1fe0 a2=0 a3=7ffdd56b1fcc items=0 ppid=1391 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.135000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 6 01:23:22.138000 audit[1442]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.138000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdc766c560 a2=0 a3=7ffdc766c54c items=0 ppid=1391 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:23:22.164000 audit[1446]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.164000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd30324be0 a2=0 a3=7ffd30324bcc items=0 ppid=1391 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:23:22.171000 audit[1447]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.171000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd213f0e30 a2=0 a3=7ffd213f0e1c items=0 ppid=1391 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:23:22.186777 kernel: Initializing XFRM netlink socket Sep 6 01:23:22.230374 env[1391]: time="2025-09-06T01:23:22.230317442Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 6 01:23:22.273000 audit[1455]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.273000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff901a3a50 a2=0 a3=7fff901a3a3c items=0 ppid=1391 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.273000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 6 01:23:22.286000 audit[1458]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.286000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff4103ca00 a2=0 a3=7fff4103c9ec items=0 ppid=1391 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 6 01:23:22.295000 audit[1461]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.295000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcd5097a00 a2=0 a3=7ffcd50979ec items=0 ppid=1391 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 6 01:23:22.298000 audit[1463]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.298000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff98b90bf0 a2=0 a3=7fff98b90bdc items=0 ppid=1391 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 6 01:23:22.301000 audit[1465]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.301000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd33839630 a2=0 a3=7ffd3383961c items=0 ppid=1391 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 6 01:23:22.304000 audit[1467]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.304000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff6c4cf040 a2=0 a3=7fff6c4cf02c items=0 ppid=1391 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 6 01:23:22.308000 audit[1469]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.308000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffec65a5250 a2=0 a3=7ffec65a523c items=0 ppid=1391 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 6 01:23:22.319000 audit[1472]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.319000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe9131b8e0 a2=0 a3=7ffe9131b8cc items=0 ppid=1391 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 6 01:23:22.322000 audit[1474]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.322000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd56e86b20 a2=0 a3=7ffd56e86b0c items=0 ppid=1391 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 6 01:23:22.325000 audit[1476]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.325000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffea2e448f0 a2=0 a3=7ffea2e448dc items=0 ppid=1391 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.325000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 6 01:23:22.328000 audit[1478]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.328000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2fe2ec90 a2=0 a3=7ffe2fe2ec7c items=0 ppid=1391 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 6 01:23:22.331481 systemd-networkd[1024]: docker0: Link UP Sep 6 01:23:22.355000 audit[1483]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.355000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc30340700 a2=0 a3=7ffc303406ec items=0 ppid=1391 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.355000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:23:22.362000 audit[1484]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:22.362000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffed0666ef0 a2=0 a3=7ffed0666edc items=0 ppid=1391 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:22.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:23:22.364925 env[1391]: time="2025-09-06T01:23:22.364882369Z" level=info msg="Loading containers: done." Sep 6 01:23:22.406121 env[1391]: time="2025-09-06T01:23:22.405934626Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 6 01:23:22.406393 env[1391]: time="2025-09-06T01:23:22.406362538Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 6 01:23:22.406586 env[1391]: time="2025-09-06T01:23:22.406558079Z" level=info msg="Daemon has completed initialization" Sep 6 01:23:22.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:22.433690 systemd[1]: Started docker.service. Sep 6 01:23:22.439548 env[1391]: time="2025-09-06T01:23:22.439362649Z" level=info msg="API listen on /run/docker.sock" Sep 6 01:23:23.967953 env[1201]: time="2025-09-06T01:23:23.967772919Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.12\"" Sep 6 01:23:25.028165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1955219597.mount: Deactivated successfully. Sep 6 01:23:25.490265 kernel: kauditd_printk_skb: 84 callbacks suppressed Sep 6 01:23:25.490680 kernel: audit: type=1131 audit(1757121805.486:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:25.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:25.487657 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 01:23:25.512000 audit: BPF prog-id=40 op=UNLOAD Sep 6 01:23:25.512000 audit: BPF prog-id=39 op=UNLOAD Sep 6 01:23:25.517461 kernel: audit: type=1334 audit(1757121805.512:256): prog-id=40 op=UNLOAD Sep 6 01:23:25.517559 kernel: audit: type=1334 audit(1757121805.512:257): prog-id=39 op=UNLOAD Sep 6 01:23:25.517621 kernel: audit: type=1334 audit(1757121805.512:258): prog-id=38 op=UNLOAD Sep 6 01:23:25.512000 audit: BPF prog-id=38 op=UNLOAD Sep 6 01:23:27.551230 env[1201]: time="2025-09-06T01:23:27.551138559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:27.553554 env[1201]: time="2025-09-06T01:23:27.553505290Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1963c5b49c1722b8f408deaf83aafca7f48f47fed0ed14e5c10e93cc55974a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:27.556188 env[1201]: time="2025-09-06T01:23:27.556149139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:27.558476 env[1201]: time="2025-09-06T01:23:27.558429589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:e9011c3bee8c06ecabd7816e119dca4e448c92f7a78acd891de3d2db1dc6c234,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:27.559785 env[1201]: time="2025-09-06T01:23:27.559705870Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.12\" returns image reference \"sha256:b1963c5b49c1722b8f408deaf83aafca7f48f47fed0ed14e5c10e93cc55974a7\"" Sep 6 01:23:27.561984 env[1201]: time="2025-09-06T01:23:27.561941794Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.12\"" Sep 6 01:23:28.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:28.939023 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 01:23:28.939317 systemd[1]: Stopped kubelet.service. Sep 6 01:23:28.950134 kernel: audit: type=1130 audit(1757121808.938:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:28.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:28.953339 systemd[1]: Starting kubelet.service... Sep 6 01:23:28.957757 kernel: audit: type=1131 audit(1757121808.938:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:29.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:29.295728 systemd[1]: Started kubelet.service. Sep 6 01:23:29.328520 kernel: audit: type=1130 audit(1757121809.295:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:29.454254 kubelet[1525]: E0906 01:23:29.454164 1525 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:29.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:23:29.457572 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:29.457838 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:29.463760 kernel: audit: type=1131 audit(1757121809.457:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:23:30.503928 env[1201]: time="2025-09-06T01:23:30.503831548Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:30.506621 env[1201]: time="2025-09-06T01:23:30.506582493Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:200c1a99a6f2b9d3b0a6e9b7362663513589341e0e58bc3b953a373efa735dfd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:30.510695 env[1201]: time="2025-09-06T01:23:30.509380569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:30.512792 env[1201]: time="2025-09-06T01:23:30.512171261Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:d2862f94d87320267fddbd55db26556a267aa802e51d6b60f25786b4c428afc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:30.513500 env[1201]: time="2025-09-06T01:23:30.513414513Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.12\" returns image reference \"sha256:200c1a99a6f2b9d3b0a6e9b7362663513589341e0e58bc3b953a373efa735dfd\"" Sep 6 01:23:30.517473 env[1201]: time="2025-09-06T01:23:30.517427814Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.12\"" Sep 6 01:23:33.020859 env[1201]: time="2025-09-06T01:23:33.020773181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:33.048815 env[1201]: time="2025-09-06T01:23:33.048750039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bcdd9599681a9460a5539177a986dbdaf880ac56eeb117ab94adb8f37889efba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:33.059759 env[1201]: time="2025-09-06T01:23:33.059698210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:33.062341 env[1201]: time="2025-09-06T01:23:33.062242635Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:152943b7e30244f4415fd0a5860a2dccd91660fe983d30a28a10edb0cc8f6756,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:33.063475 env[1201]: time="2025-09-06T01:23:33.063409821Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.12\" returns image reference \"sha256:bcdd9599681a9460a5539177a986dbdaf880ac56eeb117ab94adb8f37889efba\"" Sep 6 01:23:33.064685 env[1201]: time="2025-09-06T01:23:33.064525806Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\"" Sep 6 01:23:35.226576 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount686507524.mount: Deactivated successfully. Sep 6 01:23:36.455590 env[1201]: time="2025-09-06T01:23:36.455526778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:36.457421 env[1201]: time="2025-09-06T01:23:36.457388229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:507cc52f5f78c0cff25e904c76c18e6bfc90982e9cc2aa4dcb19033f21c3f679,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:36.459105 env[1201]: time="2025-09-06T01:23:36.459059539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:36.460796 env[1201]: time="2025-09-06T01:23:36.460762034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:90aa6b5f4065937521ff8438bc705317485d0be3f8b00a07145e697d92cc2cc6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:36.461488 env[1201]: time="2025-09-06T01:23:36.461441704Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.12\" returns image reference \"sha256:507cc52f5f78c0cff25e904c76c18e6bfc90982e9cc2aa4dcb19033f21c3f679\"" Sep 6 01:23:36.462543 env[1201]: time="2025-09-06T01:23:36.462510596Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Sep 6 01:23:37.225612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3547686475.mount: Deactivated successfully. Sep 6 01:23:39.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:39.696915 kernel: audit: type=1130 audit(1757121819.688:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:39.688939 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 6 01:23:39.689212 systemd[1]: Stopped kubelet.service. Sep 6 01:23:39.694794 systemd[1]: Starting kubelet.service... Sep 6 01:23:39.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:39.702737 kernel: audit: type=1131 audit(1757121819.688:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:39.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:39.966984 systemd[1]: Started kubelet.service. Sep 6 01:23:39.976785 kernel: audit: type=1130 audit(1757121819.966:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:40.073660 kubelet[1535]: E0906 01:23:40.073583 1535 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:40.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:23:40.076494 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:40.076810 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:40.082755 kernel: audit: type=1131 audit(1757121820.076:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:23:40.150602 env[1201]: time="2025-09-06T01:23:40.150504571Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.152913 env[1201]: time="2025-09-06T01:23:40.152865145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.155537 env[1201]: time="2025-09-06T01:23:40.155444961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.159156 env[1201]: time="2025-09-06T01:23:40.159110888Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.160651 env[1201]: time="2025-09-06T01:23:40.160606170Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Sep 6 01:23:40.163308 env[1201]: time="2025-09-06T01:23:40.163264713Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 6 01:23:40.242731 update_engine[1191]: I0906 01:23:40.240882 1191 update_attempter.cc:509] Updating boot flags... Sep 6 01:23:40.831058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3149372249.mount: Deactivated successfully. Sep 6 01:23:40.837373 env[1201]: time="2025-09-06T01:23:40.837299748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.840099 env[1201]: time="2025-09-06T01:23:40.840060950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.842448 env[1201]: time="2025-09-06T01:23:40.842398987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.844424 env[1201]: time="2025-09-06T01:23:40.844389537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:40.845737 env[1201]: time="2025-09-06T01:23:40.845666347Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 6 01:23:40.847247 env[1201]: time="2025-09-06T01:23:40.847184036Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Sep 6 01:23:41.641146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount220401520.mount: Deactivated successfully. Sep 6 01:23:47.400266 env[1201]: time="2025-09-06T01:23:47.400200144Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:47.404120 env[1201]: time="2025-09-06T01:23:47.404082536Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:47.407886 env[1201]: time="2025-09-06T01:23:47.407832342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:47.411546 env[1201]: time="2025-09-06T01:23:47.411494670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:47.414208 env[1201]: time="2025-09-06T01:23:47.414086778Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Sep 6 01:23:50.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:50.188844 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 6 01:23:50.189187 systemd[1]: Stopped kubelet.service. Sep 6 01:23:50.196687 systemd[1]: Starting kubelet.service... Sep 6 01:23:50.197176 kernel: audit: type=1130 audit(1757121830.188:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:50.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:50.205619 kernel: audit: type=1131 audit(1757121830.188:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:50.575941 systemd[1]: Started kubelet.service. Sep 6 01:23:50.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:50.592958 kernel: audit: type=1130 audit(1757121830.575:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:50.671950 kubelet[1575]: E0906 01:23:50.671871 1575 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:23:50.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:23:50.674540 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:23:50.674869 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:23:50.681751 kernel: audit: type=1131 audit(1757121830.674:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:23:52.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:52.255434 systemd[1]: Stopped kubelet.service. Sep 6 01:23:52.273188 kernel: audit: type=1130 audit(1757121832.254:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:52.273287 kernel: audit: type=1131 audit(1757121832.261:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:52.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:52.266951 systemd[1]: Starting kubelet.service... Sep 6 01:23:52.309903 systemd[1]: Reloading. Sep 6 01:23:52.474325 /usr/lib/systemd/system-generators/torcx-generator[1610]: time="2025-09-06T01:23:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:23:52.476498 /usr/lib/systemd/system-generators/torcx-generator[1610]: time="2025-09-06T01:23:52Z" level=info msg="torcx already run" Sep 6 01:23:52.591000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:23:52.591457 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:23:52.621980 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:23:52.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.750438 kernel: audit: type=1400 audit(1757121832.733:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.750537 kernel: audit: type=1400 audit(1757121832.733:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755759 kernel: audit: type=1400 audit(1757121832.733:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761028 kernel: audit: type=1400 audit(1757121832.733:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit: BPF prog-id=43 op=LOAD Sep 6 01:23:52.744000 audit: BPF prog-id=24 op=UNLOAD Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit: BPF prog-id=44 op=LOAD Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.744000 audit: BPF prog-id=45 op=LOAD Sep 6 01:23:52.744000 audit: BPF prog-id=25 op=UNLOAD Sep 6 01:23:52.744000 audit: BPF prog-id=26 op=UNLOAD Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.749000 audit: BPF prog-id=46 op=LOAD Sep 6 01:23:52.749000 audit: BPF prog-id=27 op=UNLOAD Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit: BPF prog-id=47 op=LOAD Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.755000 audit: BPF prog-id=48 op=LOAD Sep 6 01:23:52.755000 audit: BPF prog-id=28 op=UNLOAD Sep 6 01:23:52.755000 audit: BPF prog-id=29 op=UNLOAD Sep 6 01:23:52.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit: BPF prog-id=50 op=LOAD Sep 6 01:23:52.762000 audit: BPF prog-id=30 op=UNLOAD Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.762000 audit: BPF prog-id=31 op=UNLOAD Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.764000 audit: BPF prog-id=53 op=LOAD Sep 6 01:23:52.765000 audit: BPF prog-id=35 op=UNLOAD Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit: BPF prog-id=54 op=LOAD Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.765000 audit: BPF prog-id=55 op=LOAD Sep 6 01:23:52.765000 audit: BPF prog-id=36 op=UNLOAD Sep 6 01:23:52.765000 audit: BPF prog-id=37 op=UNLOAD Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.767000 audit: BPF prog-id=56 op=LOAD Sep 6 01:23:52.767000 audit: BPF prog-id=33 op=UNLOAD Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:52.769000 audit: BPF prog-id=57 op=LOAD Sep 6 01:23:52.769000 audit: BPF prog-id=34 op=UNLOAD Sep 6 01:23:52.793497 systemd[1]: Started kubelet.service. Sep 6 01:23:52.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:52.801982 systemd[1]: Stopping kubelet.service... Sep 6 01:23:52.804135 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 01:23:52.804460 systemd[1]: Stopped kubelet.service. Sep 6 01:23:52.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:52.807090 systemd[1]: Starting kubelet.service... Sep 6 01:23:53.047090 systemd[1]: Started kubelet.service. Sep 6 01:23:53.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:23:53.131299 kubelet[1661]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:23:53.132050 kubelet[1661]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 6 01:23:53.132050 kubelet[1661]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:23:53.132189 kubelet[1661]: I0906 01:23:53.132100 1661 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 01:23:53.847926 kubelet[1661]: I0906 01:23:53.847863 1661 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 6 01:23:53.847926 kubelet[1661]: I0906 01:23:53.847912 1661 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 01:23:53.848298 kubelet[1661]: I0906 01:23:53.848266 1661 server.go:934] "Client rotation is on, will bootstrap in background" Sep 6 01:23:53.882325 kubelet[1661]: E0906 01:23:53.882262 1661 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.79.10:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:53.883550 kubelet[1661]: I0906 01:23:53.883519 1661 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 01:23:53.898525 kubelet[1661]: E0906 01:23:53.898480 1661 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 01:23:53.898525 kubelet[1661]: I0906 01:23:53.898521 1661 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 01:23:53.905934 kubelet[1661]: I0906 01:23:53.905898 1661 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 01:23:53.906974 kubelet[1661]: I0906 01:23:53.906935 1661 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 6 01:23:53.907359 kubelet[1661]: I0906 01:23:53.907303 1661 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 01:23:53.907684 kubelet[1661]: I0906 01:23:53.907359 1661 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-bf5vc.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 01:23:53.908000 kubelet[1661]: I0906 01:23:53.907773 1661 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 01:23:53.908000 kubelet[1661]: I0906 01:23:53.907795 1661 container_manager_linux.go:300] "Creating device plugin manager" Sep 6 01:23:53.908000 kubelet[1661]: I0906 01:23:53.907996 1661 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:23:53.911616 kubelet[1661]: I0906 01:23:53.911585 1661 kubelet.go:408] "Attempting to sync node with API server" Sep 6 01:23:53.911789 kubelet[1661]: I0906 01:23:53.911654 1661 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 01:23:53.911789 kubelet[1661]: I0906 01:23:53.911753 1661 kubelet.go:314] "Adding apiserver pod source" Sep 6 01:23:53.911935 kubelet[1661]: I0906 01:23:53.911841 1661 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 01:23:53.915466 kubelet[1661]: W0906 01:23:53.915375 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.79.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-bf5vc.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:53.915616 kubelet[1661]: E0906 01:23:53.915582 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.79.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-bf5vc.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:53.918436 kubelet[1661]: W0906 01:23:53.918403 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.79.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:53.918660 kubelet[1661]: E0906 01:23:53.918626 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.79.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:53.918936 kubelet[1661]: I0906 01:23:53.918909 1661 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 01:23:53.919764 kubelet[1661]: I0906 01:23:53.919741 1661 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 01:23:53.920614 kubelet[1661]: W0906 01:23:53.920589 1661 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 01:23:53.926436 kubelet[1661]: I0906 01:23:53.926410 1661 server.go:1274] "Started kubelet" Sep 6 01:23:53.932489 kubelet[1661]: I0906 01:23:53.931669 1661 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 01:23:53.933768 kubelet[1661]: I0906 01:23:53.933464 1661 server.go:449] "Adding debug handlers to kubelet server" Sep 6 01:23:53.935307 kubelet[1661]: I0906 01:23:53.935267 1661 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 01:23:53.935811 kubelet[1661]: I0906 01:23:53.935785 1661 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 01:23:53.939933 kubelet[1661]: E0906 01:23:53.936168 1661 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.79.10:6443/api/v1/namespaces/default/events\": dial tcp 10.230.79.10:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-bf5vc.gb1.brightbox.com.18628cff9242b666 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-bf5vc.gb1.brightbox.com,UID:srv-bf5vc.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-bf5vc.gb1.brightbox.com,},FirstTimestamp:2025-09-06 01:23:53.926309478 +0000 UTC m=+0.869061989,LastTimestamp:2025-09-06 01:23:53.926309478 +0000 UTC m=+0.869061989,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-bf5vc.gb1.brightbox.com,}" Sep 6 01:23:53.945200 kubelet[1661]: E0906 01:23:53.945172 1661 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 01:23:53.945000 audit[1661]: AVC avc: denied { mac_admin } for pid=1661 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:53.945000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:23:53.945000 audit[1661]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b33110 a1=c000a6ec78 a2=c000b330e0 a3=25 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.945000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:23:53.945000 audit[1661]: AVC avc: denied { mac_admin } for pid=1661 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:53.945000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:23:53.945000 audit[1661]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b44720 a1=c000a6ec90 a2=c000b331a0 a3=25 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.945000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:23:53.947020 kubelet[1661]: I0906 01:23:53.946165 1661 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 01:23:53.947020 kubelet[1661]: I0906 01:23:53.946234 1661 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 6 01:23:53.947020 kubelet[1661]: I0906 01:23:53.946351 1661 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 01:23:53.947440 kubelet[1661]: I0906 01:23:53.947409 1661 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 01:23:53.950000 audit[1673]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.950000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9824d020 a2=0 a3=7ffd9824d00c items=0 ppid=1661 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:23:53.952502 kubelet[1661]: E0906 01:23:53.952463 1661 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-bf5vc.gb1.brightbox.com\" not found" Sep 6 01:23:53.952706 kubelet[1661]: I0906 01:23:53.952681 1661 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 6 01:23:53.952000 audit[1674]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.952000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7af0cdc0 a2=0 a3=7fff7af0cdac items=0 ppid=1661 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:23:53.953567 kubelet[1661]: I0906 01:23:53.953541 1661 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 6 01:23:53.953806 kubelet[1661]: I0906 01:23:53.953784 1661 reconciler.go:26] "Reconciler: start to sync state" Sep 6 01:23:53.954855 kubelet[1661]: E0906 01:23:53.954818 1661 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.79.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-bf5vc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.79.10:6443: connect: connection refused" interval="200ms" Sep 6 01:23:53.955239 kubelet[1661]: I0906 01:23:53.955212 1661 factory.go:221] Registration of the systemd container factory successfully Sep 6 01:23:53.955458 kubelet[1661]: I0906 01:23:53.955429 1661 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 01:23:53.956275 kubelet[1661]: W0906 01:23:53.956190 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.79.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:53.956458 kubelet[1661]: E0906 01:23:53.956426 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.79.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:53.955000 audit[1676]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.955000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1f9bde20 a2=0 a3=7ffc1f9bde0c items=0 ppid=1661 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:23:53.958479 kubelet[1661]: I0906 01:23:53.958453 1661 factory.go:221] Registration of the containerd container factory successfully Sep 6 01:23:53.959000 audit[1678]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.959000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd265db5a0 a2=0 a3=7ffd265db58c items=0 ppid=1661 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:23:53.980000 audit[1681]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.980000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc76845140 a2=0 a3=7ffc7684512c items=0 ppid=1661 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 01:23:53.987560 kubelet[1661]: I0906 01:23:53.987486 1661 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 01:23:53.988000 audit[1683]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:23:53.988000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd68531ce0 a2=0 a3=7ffd68531ccc items=0 ppid=1661 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:23:53.989830 kubelet[1661]: I0906 01:23:53.989741 1661 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 01:23:53.989830 kubelet[1661]: I0906 01:23:53.989819 1661 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 6 01:23:53.989937 kubelet[1661]: I0906 01:23:53.989900 1661 kubelet.go:2321] "Starting kubelet main sync loop" Sep 6 01:23:53.990060 kubelet[1661]: E0906 01:23:53.990002 1661 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 01:23:53.990000 audit[1684]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.990000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff35f16ed0 a2=0 a3=7fff35f16ebc items=0 ppid=1661 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:23:53.992000 audit[1685]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.992000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe817849c0 a2=0 a3=7ffe817849ac items=0 ppid=1661 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:23:53.993000 audit[1686]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:23:53.993000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7da3d740 a2=0 a3=7ffe7da3d72c items=0 ppid=1661 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:23:53.994000 audit[1687]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:23:53.994000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7d6f76c0 a2=0 a3=7ffc7d6f76ac items=0 ppid=1661 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:23:53.996000 audit[1689]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:23:53.996000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffea5bbb700 a2=0 a3=7ffea5bbb6ec items=0 ppid=1661 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:53.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:23:54.004481 kubelet[1661]: W0906 01:23:54.004426 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.79.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:54.004678 kubelet[1661]: E0906 01:23:54.004628 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.79.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:54.003000 audit[1691]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:23:54.003000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5990bd90 a2=0 a3=7ffc5990bd7c items=0 ppid=1661 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:54.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:23:54.008514 kubelet[1661]: I0906 01:23:54.008488 1661 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 6 01:23:54.008681 kubelet[1661]: I0906 01:23:54.008658 1661 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 6 01:23:54.008910 kubelet[1661]: I0906 01:23:54.008887 1661 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:23:54.011215 kubelet[1661]: I0906 01:23:54.011189 1661 policy_none.go:49] "None policy: Start" Sep 6 01:23:54.012338 kubelet[1661]: I0906 01:23:54.012301 1661 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 6 01:23:54.012500 kubelet[1661]: I0906 01:23:54.012360 1661 state_mem.go:35] "Initializing new in-memory state store" Sep 6 01:23:54.023385 systemd[1]: Created slice kubepods.slice. Sep 6 01:23:54.031301 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 01:23:54.036600 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 01:23:54.045064 kubelet[1661]: I0906 01:23:54.045033 1661 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 01:23:54.045000 audit[1661]: AVC avc: denied { mac_admin } for pid=1661 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:54.045000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:23:54.045000 audit[1661]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002fdc20 a1=c000a422b8 a2=c0002fdbf0 a3=25 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:54.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:23:54.048496 kubelet[1661]: I0906 01:23:54.047817 1661 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 01:23:54.048854 kubelet[1661]: I0906 01:23:54.048803 1661 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 01:23:54.048939 kubelet[1661]: I0906 01:23:54.048861 1661 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 01:23:54.049649 kubelet[1661]: I0906 01:23:54.049595 1661 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 01:23:54.053981 kubelet[1661]: E0906 01:23:54.053937 1661 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-bf5vc.gb1.brightbox.com\" not found" Sep 6 01:23:54.106402 systemd[1]: Created slice kubepods-burstable-podbc1bfc16ac1d890ae4140619823c875d.slice. Sep 6 01:23:54.121851 systemd[1]: Created slice kubepods-burstable-pod5aad7f0bc09f55f4eef2e5295cbb3547.slice. Sep 6 01:23:54.129435 systemd[1]: Created slice kubepods-burstable-pod4a6d870479bc9fcb0fe08bd8afc7eca0.slice. Sep 6 01:23:54.153069 kubelet[1661]: I0906 01:23:54.152995 1661 kubelet_node_status.go:72] "Attempting to register node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.154465 kubelet[1661]: E0906 01:23:54.154401 1661 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.79.10:6443/api/v1/nodes\": dial tcp 10.230.79.10:6443: connect: connection refused" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.155660 kubelet[1661]: E0906 01:23:54.155610 1661 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.79.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-bf5vc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.79.10:6443: connect: connection refused" interval="400ms" Sep 6 01:23:54.254617 kubelet[1661]: I0906 01:23:54.254504 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-k8s-certs\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.255021 kubelet[1661]: I0906 01:23:54.254992 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-kubeconfig\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.255231 kubelet[1661]: I0906 01:23:54.255202 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-flexvolume-dir\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.255407 kubelet[1661]: I0906 01:23:54.255374 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.255560 kubelet[1661]: I0906 01:23:54.255533 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bc1bfc16ac1d890ae4140619823c875d-kubeconfig\") pod \"kube-scheduler-srv-bf5vc.gb1.brightbox.com\" (UID: \"bc1bfc16ac1d890ae4140619823c875d\") " pod="kube-system/kube-scheduler-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.255764 kubelet[1661]: I0906 01:23:54.255699 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5aad7f0bc09f55f4eef2e5295cbb3547-ca-certs\") pod \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" (UID: \"5aad7f0bc09f55f4eef2e5295cbb3547\") " pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.255926 kubelet[1661]: I0906 01:23:54.255896 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5aad7f0bc09f55f4eef2e5295cbb3547-k8s-certs\") pod \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" (UID: \"5aad7f0bc09f55f4eef2e5295cbb3547\") " pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.256068 kubelet[1661]: I0906 01:23:54.256041 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5aad7f0bc09f55f4eef2e5295cbb3547-usr-share-ca-certificates\") pod \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" (UID: \"5aad7f0bc09f55f4eef2e5295cbb3547\") " pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.256242 kubelet[1661]: I0906 01:23:54.256207 1661 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-ca-certs\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.357994 kubelet[1661]: I0906 01:23:54.357942 1661 kubelet_node_status.go:72] "Attempting to register node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.358863 kubelet[1661]: E0906 01:23:54.358823 1661 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.79.10:6443/api/v1/nodes\": dial tcp 10.230.79.10:6443: connect: connection refused" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.422108 env[1201]: time="2025-09-06T01:23:54.420846811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-bf5vc.gb1.brightbox.com,Uid:bc1bfc16ac1d890ae4140619823c875d,Namespace:kube-system,Attempt:0,}" Sep 6 01:23:54.428285 env[1201]: time="2025-09-06T01:23:54.428210024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-bf5vc.gb1.brightbox.com,Uid:5aad7f0bc09f55f4eef2e5295cbb3547,Namespace:kube-system,Attempt:0,}" Sep 6 01:23:54.433150 env[1201]: time="2025-09-06T01:23:54.433037910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-bf5vc.gb1.brightbox.com,Uid:4a6d870479bc9fcb0fe08bd8afc7eca0,Namespace:kube-system,Attempt:0,}" Sep 6 01:23:54.557307 kubelet[1661]: E0906 01:23:54.557190 1661 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.79.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-bf5vc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.79.10:6443: connect: connection refused" interval="800ms" Sep 6 01:23:54.762616 kubelet[1661]: I0906 01:23:54.762168 1661 kubelet_node_status.go:72] "Attempting to register node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:54.762616 kubelet[1661]: E0906 01:23:54.762554 1661 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.79.10:6443/api/v1/nodes\": dial tcp 10.230.79.10:6443: connect: connection refused" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:55.164430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1375680791.mount: Deactivated successfully. Sep 6 01:23:55.171209 env[1201]: time="2025-09-06T01:23:55.171139134Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.174426 kubelet[1661]: W0906 01:23:55.174294 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.79.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-bf5vc.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:55.174426 kubelet[1661]: E0906 01:23:55.174383 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.79.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-bf5vc.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:55.174911 env[1201]: time="2025-09-06T01:23:55.174822908Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.177583 env[1201]: time="2025-09-06T01:23:55.177527889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.179824 env[1201]: time="2025-09-06T01:23:55.179761945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.181474 env[1201]: time="2025-09-06T01:23:55.181377667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.183362 env[1201]: time="2025-09-06T01:23:55.183294937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.188027 env[1201]: time="2025-09-06T01:23:55.187984018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.189121 env[1201]: time="2025-09-06T01:23:55.189074991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.190159 env[1201]: time="2025-09-06T01:23:55.190124800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.194367 env[1201]: time="2025-09-06T01:23:55.194307494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.196896 env[1201]: time="2025-09-06T01:23:55.196859051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.198370 env[1201]: time="2025-09-06T01:23:55.198321808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:23:55.251460 env[1201]: time="2025-09-06T01:23:55.251297748Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:23:55.251609 env[1201]: time="2025-09-06T01:23:55.251485636Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:23:55.251609 env[1201]: time="2025-09-06T01:23:55.251558405Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:23:55.252118 env[1201]: time="2025-09-06T01:23:55.252058958Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/56e53f09cb286f0af004b517a629f1d3455f43d5f2a77cb6a7b7076c4301c562 pid=1716 runtime=io.containerd.runc.v2 Sep 6 01:23:55.252541 env[1201]: time="2025-09-06T01:23:55.252441751Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:23:55.252541 env[1201]: time="2025-09-06T01:23:55.252506884Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:23:55.252761 env[1201]: time="2025-09-06T01:23:55.252525262Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:23:55.253141 env[1201]: time="2025-09-06T01:23:55.253074867Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6018e0c325e8cd4ff7d64ca844f40368891dfce3bac82bfad71dabb23d7e0447 pid=1711 runtime=io.containerd.runc.v2 Sep 6 01:23:55.253493 env[1201]: time="2025-09-06T01:23:55.253359177Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:23:55.253493 env[1201]: time="2025-09-06T01:23:55.253466050Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:23:55.253740 env[1201]: time="2025-09-06T01:23:55.253671192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:23:55.255276 env[1201]: time="2025-09-06T01:23:55.255055248Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54e9984aa48ca994c9bc5a4fe11891d9f722dda7f852bee6ad10d19f05bc9580 pid=1728 runtime=io.containerd.runc.v2 Sep 6 01:23:55.291522 systemd[1]: Started cri-containerd-56e53f09cb286f0af004b517a629f1d3455f43d5f2a77cb6a7b7076c4301c562.scope. Sep 6 01:23:55.308340 systemd[1]: Started cri-containerd-54e9984aa48ca994c9bc5a4fe11891d9f722dda7f852bee6ad10d19f05bc9580.scope. Sep 6 01:23:55.325834 systemd[1]: Started cri-containerd-6018e0c325e8cd4ff7d64ca844f40368891dfce3bac82bfad71dabb23d7e0447.scope. Sep 6 01:23:55.336995 kubelet[1661]: W0906 01:23:55.336830 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.79.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:55.336995 kubelet[1661]: E0906 01:23:55.336929 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.79.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:55.366558 kernel: kauditd_printk_skb: 263 callbacks suppressed Sep 6 01:23:55.366748 kernel: audit: type=1400 audit(1757121835.352:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.368707 kubelet[1661]: W0906 01:23:55.368365 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.79.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:55.368707 kubelet[1661]: E0906 01:23:55.368443 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.79.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:55.368707 kubelet[1661]: E0906 01:23:55.368629 1661 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.79.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-bf5vc.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.79.10:6443: connect: connection refused" interval="1.6s" Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.379443 kernel: audit: type=1400 audit(1757121835.352:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.379513 kernel: audit: type=1400 audit(1757121835.352:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.380406 kubelet[1661]: W0906 01:23:55.380238 1661 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.79.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.79.10:6443: connect: connection refused Sep 6 01:23:55.380406 kubelet[1661]: E0906 01:23:55.380330 1661 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.79.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.385838 kernel: audit: type=1400 audit(1757121835.352:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.394739 kernel: audit: type=1400 audit(1757121835.352:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.400751 kernel: audit: type=1400 audit(1757121835.352:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.407750 kernel: audit: type=1400 audit(1757121835.352:447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.416091 kernel: audit: type=1400 audit(1757121835.352:448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.422789 kernel: audit: type=1400 audit(1757121835.352:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.434732 kernel: audit: type=1400 audit(1757121835.365:450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.365000 audit: BPF prog-id=58 op=LOAD Sep 6 01:23:55.366000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.366000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653533663039636232383666306166303034623531376136323966 Sep 6 01:23:55.366000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.366000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653533663039636232383666306166303034623531376136323966 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit: BPF prog-id=59 op=LOAD Sep 6 01:23:55.367000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f4030 items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653533663039636232383666306166303034623531376136323966 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit: BPF prog-id=60 op=LOAD Sep 6 01:23:55.367000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f4078 items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653533663039636232383666306166303034623531376136323966 Sep 6 01:23:55.367000 audit: BPF prog-id=60 op=UNLOAD Sep 6 01:23:55.367000 audit: BPF prog-id=59 op=UNLOAD Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.367000 audit: BPF prog-id=61 op=LOAD Sep 6 01:23:55.367000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f4488 items=0 ppid=1716 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653533663039636232383666306166303034623531376136323966 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit: BPF prog-id=62 op=LOAD Sep 6 01:23:55.436000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.436000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1711 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313865306333323565386364346666376436346361383434663430 Sep 6 01:23:55.440000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.440000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1711 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313865306333323565386364346666376436346361383434663430 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.441000 audit: BPF prog-id=63 op=LOAD Sep 6 01:23:55.441000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003baaa0 items=0 ppid=1711 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313865306333323565386364346666376436346361383434663430 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.445000 audit: BPF prog-id=64 op=LOAD Sep 6 01:23:55.445000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003baae8 items=0 ppid=1711 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.447313 env[1201]: time="2025-09-06T01:23:55.447164845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-bf5vc.gb1.brightbox.com,Uid:5aad7f0bc09f55f4eef2e5295cbb3547,Namespace:kube-system,Attempt:0,} returns sandbox id \"56e53f09cb286f0af004b517a629f1d3455f43d5f2a77cb6a7b7076c4301c562\"" Sep 6 01:23:55.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313865306333323565386364346666376436346361383434663430 Sep 6 01:23:55.449000 audit: BPF prog-id=64 op=UNLOAD Sep 6 01:23:55.450000 audit: BPF prog-id=63 op=UNLOAD Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { perfmon } for pid=1752 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit[1752]: AVC avc: denied { bpf } for pid=1752 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.450000 audit: BPF prog-id=65 op=LOAD Sep 6 01:23:55.450000 audit[1752]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003baef8 items=0 ppid=1711 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313865306333323565386364346666376436346361383434663430 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.456000 audit: BPF prog-id=66 op=LOAD Sep 6 01:23:55.457000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.457000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1728 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653939383461613438636139393463396263356134666531313839 Sep 6 01:23:55.457000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.457000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1728 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653939383461613438636139393463396263356134666531313839 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit: BPF prog-id=67 op=LOAD Sep 6 01:23:55.458000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000261ce0 items=0 ppid=1728 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653939383461613438636139393463396263356134666531313839 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit: BPF prog-id=68 op=LOAD Sep 6 01:23:55.458000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000261d28 items=0 ppid=1728 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653939383461613438636139393463396263356134666531313839 Sep 6 01:23:55.458000 audit: BPF prog-id=68 op=UNLOAD Sep 6 01:23:55.458000 audit: BPF prog-id=67 op=UNLOAD Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.458000 audit: BPF prog-id=69 op=LOAD Sep 6 01:23:55.458000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e2138 items=0 ppid=1728 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534653939383461613438636139393463396263356134666531313839 Sep 6 01:23:55.461952 env[1201]: time="2025-09-06T01:23:55.457627305Z" level=info msg="CreateContainer within sandbox \"56e53f09cb286f0af004b517a629f1d3455f43d5f2a77cb6a7b7076c4301c562\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 6 01:23:55.502060 env[1201]: time="2025-09-06T01:23:55.501999471Z" level=info msg="CreateContainer within sandbox \"56e53f09cb286f0af004b517a629f1d3455f43d5f2a77cb6a7b7076c4301c562\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3a3c0b36aae633a1e4077b3a6a460e3be00ba71e6c158e791011d9c2271e074c\"" Sep 6 01:23:55.505149 env[1201]: time="2025-09-06T01:23:55.505107243Z" level=info msg="StartContainer for \"3a3c0b36aae633a1e4077b3a6a460e3be00ba71e6c158e791011d9c2271e074c\"" Sep 6 01:23:55.512617 env[1201]: time="2025-09-06T01:23:55.512531941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-bf5vc.gb1.brightbox.com,Uid:bc1bfc16ac1d890ae4140619823c875d,Namespace:kube-system,Attempt:0,} returns sandbox id \"54e9984aa48ca994c9bc5a4fe11891d9f722dda7f852bee6ad10d19f05bc9580\"" Sep 6 01:23:55.516178 env[1201]: time="2025-09-06T01:23:55.516136405Z" level=info msg="CreateContainer within sandbox \"54e9984aa48ca994c9bc5a4fe11891d9f722dda7f852bee6ad10d19f05bc9580\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 6 01:23:55.524149 env[1201]: time="2025-09-06T01:23:55.524090543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-bf5vc.gb1.brightbox.com,Uid:4a6d870479bc9fcb0fe08bd8afc7eca0,Namespace:kube-system,Attempt:0,} returns sandbox id \"6018e0c325e8cd4ff7d64ca844f40368891dfce3bac82bfad71dabb23d7e0447\"" Sep 6 01:23:55.528241 env[1201]: time="2025-09-06T01:23:55.528194262Z" level=info msg="CreateContainer within sandbox \"6018e0c325e8cd4ff7d64ca844f40368891dfce3bac82bfad71dabb23d7e0447\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 6 01:23:55.541170 env[1201]: time="2025-09-06T01:23:55.541104907Z" level=info msg="CreateContainer within sandbox \"54e9984aa48ca994c9bc5a4fe11891d9f722dda7f852bee6ad10d19f05bc9580\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a3efb62f97d0f460b1b2adf44c54526436e6215534e87f5a1986dc5234b63883\"" Sep 6 01:23:55.542886 env[1201]: time="2025-09-06T01:23:55.542826559Z" level=info msg="StartContainer for \"a3efb62f97d0f460b1b2adf44c54526436e6215534e87f5a1986dc5234b63883\"" Sep 6 01:23:55.552328 env[1201]: time="2025-09-06T01:23:55.552270261Z" level=info msg="CreateContainer within sandbox \"6018e0c325e8cd4ff7d64ca844f40368891dfce3bac82bfad71dabb23d7e0447\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"9325f048aae645e8c06ee0f118661a7fe03040b16bfede1a56e06851cf231fe8\"" Sep 6 01:23:55.553269 env[1201]: time="2025-09-06T01:23:55.553187507Z" level=info msg="StartContainer for \"9325f048aae645e8c06ee0f118661a7fe03040b16bfede1a56e06851cf231fe8\"" Sep 6 01:23:55.559053 systemd[1]: Started cri-containerd-3a3c0b36aae633a1e4077b3a6a460e3be00ba71e6c158e791011d9c2271e074c.scope. Sep 6 01:23:55.571055 kubelet[1661]: I0906 01:23:55.568454 1661 kubelet_node_status.go:72] "Attempting to register node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:55.571055 kubelet[1661]: E0906 01:23:55.568984 1661 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.230.79.10:6443/api/v1/nodes\": dial tcp 10.230.79.10:6443: connect: connection refused" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit: BPF prog-id=70 op=LOAD Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1716 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361336330623336616165363333613165343037376233613661343630 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1716 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361336330623336616165363333613165343037376233613661343630 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.586000 audit: BPF prog-id=71 op=LOAD Sep 6 01:23:55.586000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c5150 items=0 ppid=1716 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361336330623336616165363333613165343037376233613661343630 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit: BPF prog-id=72 op=LOAD Sep 6 01:23:55.587000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c5198 items=0 ppid=1716 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361336330623336616165363333613165343037376233613661343630 Sep 6 01:23:55.587000 audit: BPF prog-id=72 op=UNLOAD Sep 6 01:23:55.587000 audit: BPF prog-id=71 op=UNLOAD Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.587000 audit: BPF prog-id=73 op=LOAD Sep 6 01:23:55.587000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c55a8 items=0 ppid=1716 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361336330623336616165363333613165343037376233613661343630 Sep 6 01:23:55.598692 systemd[1]: Started cri-containerd-a3efb62f97d0f460b1b2adf44c54526436e6215534e87f5a1986dc5234b63883.scope. Sep 6 01:23:55.613007 systemd[1]: Started cri-containerd-9325f048aae645e8c06ee0f118661a7fe03040b16bfede1a56e06851cf231fe8.scope. Sep 6 01:23:55.656840 env[1201]: time="2025-09-06T01:23:55.656774031Z" level=info msg="StartContainer for \"3a3c0b36aae633a1e4077b3a6a460e3be00ba71e6c158e791011d9c2271e074c\" returns successfully" Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.667000 audit: BPF prog-id=74 op=LOAD Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1711 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566303438616165363435653863303665653066313138363631 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1711 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566303438616165363435653863303665653066313138363631 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit: BPF prog-id=75 op=LOAD Sep 6 01:23:55.672000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000351ed0 items=0 ppid=1711 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566303438616165363435653863303665653066313138363631 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.672000 audit: BPF prog-id=76 op=LOAD Sep 6 01:23:55.672000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000351f18 items=0 ppid=1711 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566303438616165363435653863303665653066313138363631 Sep 6 01:23:55.673000 audit: BPF prog-id=76 op=UNLOAD Sep 6 01:23:55.673000 audit: BPF prog-id=75 op=UNLOAD Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { perfmon } for pid=1870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit[1870]: AVC avc: denied { bpf } for pid=1870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.673000 audit: BPF prog-id=77 op=LOAD Sep 6 01:23:55.673000 audit[1870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b8328 items=0 ppid=1711 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933323566303438616165363435653863303665653066313138363631 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.680000 audit: BPF prog-id=78 op=LOAD Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1728 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656662363266393764306634363062316232616466343463353435 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1728 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656662363266393764306634363062316232616466343463353435 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit: BPF prog-id=79 op=LOAD Sep 6 01:23:55.681000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000282510 items=0 ppid=1728 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656662363266393764306634363062316232616466343463353435 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit: BPF prog-id=80 op=LOAD Sep 6 01:23:55.681000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000282558 items=0 ppid=1728 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656662363266393764306634363062316232616466343463353435 Sep 6 01:23:55.681000 audit: BPF prog-id=80 op=UNLOAD Sep 6 01:23:55.681000 audit: BPF prog-id=79 op=UNLOAD Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:23:55.681000 audit: BPF prog-id=81 op=LOAD Sep 6 01:23:55.681000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000282968 items=0 ppid=1728 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:23:55.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656662363266393764306634363062316232616466343463353435 Sep 6 01:23:55.734840 env[1201]: time="2025-09-06T01:23:55.734756819Z" level=info msg="StartContainer for \"9325f048aae645e8c06ee0f118661a7fe03040b16bfede1a56e06851cf231fe8\" returns successfully" Sep 6 01:23:55.753422 env[1201]: time="2025-09-06T01:23:55.753360669Z" level=info msg="StartContainer for \"a3efb62f97d0f460b1b2adf44c54526436e6215534e87f5a1986dc5234b63883\" returns successfully" Sep 6 01:23:55.961633 kubelet[1661]: E0906 01:23:55.961570 1661 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.79.10:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.79.10:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:23:57.174136 kubelet[1661]: I0906 01:23:57.174095 1661 kubelet_node_status.go:72] "Attempting to register node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:57.865000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:57.865000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000144240 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:23:57.865000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:23:57.865000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:57.865000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000cd4060 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:23:57.865000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:23:58.804000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:58.804000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0030d6f90 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:23:58.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:23:58.805000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:58.806000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:58.806000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003a9a750 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:23:58.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:23:58.805000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0053c40c0 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:23:58.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:23:58.811000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:58.811000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c00594c4e0 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:23:58.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:23:58.812000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:58.812000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0053c42c0 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:23:58.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:23:58.812000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:23:58.812000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00594d170 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:23:58.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:23:58.920102 kubelet[1661]: I0906 01:23:58.920057 1661 apiserver.go:52] "Watching apiserver" Sep 6 01:23:58.954430 kubelet[1661]: I0906 01:23:58.954387 1661 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 6 01:23:58.972064 kubelet[1661]: E0906 01:23:58.972019 1661 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-bf5vc.gb1.brightbox.com\" not found" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:23:58.995331 kubelet[1661]: I0906 01:23:58.995279 1661 kubelet_node_status.go:75] "Successfully registered node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:01.029390 systemd[1]: Reloading. Sep 6 01:24:01.166944 /usr/lib/systemd/system-generators/torcx-generator[1959]: time="2025-09-06T01:24:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:24:01.167592 /usr/lib/systemd/system-generators/torcx-generator[1959]: time="2025-09-06T01:24:01Z" level=info msg="torcx already run" Sep 6 01:24:01.269400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:24:01.269779 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:24:01.296519 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.428934 kernel: kauditd_printk_skb: 356 callbacks suppressed Sep 6 01:24:01.429099 kernel: audit: type=1400 audit(1757121841.414:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.438736 kernel: audit: type=1400 audit(1757121841.414:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.438817 kernel: audit: type=1400 audit(1757121841.414:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.448399 kernel: audit: type=1400 audit(1757121841.414:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.453345 kernel: audit: type=1400 audit(1757121841.414:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.453414 kernel: audit: type=1400 audit(1757121841.414:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.463049 kernel: audit: type=1400 audit(1757121841.414:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.463140 kernel: audit: type=1400 audit(1757121841.414:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.467950 kernel: audit: type=1400 audit(1757121841.414:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.477663 kernel: audit: type=1400 audit(1757121841.432:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.432000 audit: BPF prog-id=82 op=LOAD Sep 6 01:24:01.433000 audit: BPF prog-id=43 op=UNLOAD Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit: BPF prog-id=83 op=LOAD Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.442000 audit: BPF prog-id=84 op=LOAD Sep 6 01:24:01.442000 audit: BPF prog-id=44 op=UNLOAD Sep 6 01:24:01.442000 audit: BPF prog-id=45 op=UNLOAD Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.452000 audit: BPF prog-id=85 op=LOAD Sep 6 01:24:01.452000 audit: BPF prog-id=46 op=UNLOAD Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.467000 audit: BPF prog-id=86 op=LOAD Sep 6 01:24:01.467000 audit: BPF prog-id=74 op=UNLOAD Sep 6 01:24:01.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.476000 audit: BPF prog-id=87 op=LOAD Sep 6 01:24:01.481000 audit: BPF prog-id=70 op=UNLOAD Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit: BPF prog-id=88 op=LOAD Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.482000 audit: BPF prog-id=89 op=LOAD Sep 6 01:24:01.482000 audit: BPF prog-id=47 op=UNLOAD Sep 6 01:24:01.482000 audit: BPF prog-id=48 op=UNLOAD Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.485000 audit: BPF prog-id=90 op=LOAD Sep 6 01:24:01.485000 audit: BPF prog-id=49 op=UNLOAD Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit: BPF prog-id=91 op=LOAD Sep 6 01:24:01.486000 audit: BPF prog-id=50 op=UNLOAD Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit: BPF prog-id=92 op=LOAD Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.486000 audit: BPF prog-id=93 op=LOAD Sep 6 01:24:01.486000 audit: BPF prog-id=51 op=UNLOAD Sep 6 01:24:01.486000 audit: BPF prog-id=52 op=UNLOAD Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.487000 audit: BPF prog-id=94 op=LOAD Sep 6 01:24:01.487000 audit: BPF prog-id=62 op=UNLOAD Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit: BPF prog-id=95 op=LOAD Sep 6 01:24:01.489000 audit: BPF prog-id=53 op=UNLOAD Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.489000 audit: BPF prog-id=96 op=LOAD Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.490000 audit: BPF prog-id=97 op=LOAD Sep 6 01:24:01.490000 audit: BPF prog-id=54 op=UNLOAD Sep 6 01:24:01.490000 audit: BPF prog-id=55 op=UNLOAD Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.491000 audit: BPF prog-id=98 op=LOAD Sep 6 01:24:01.491000 audit: BPF prog-id=56 op=UNLOAD Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.493000 audit: BPF prog-id=99 op=LOAD Sep 6 01:24:01.493000 audit: BPF prog-id=78 op=UNLOAD Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.494000 audit: BPF prog-id=100 op=LOAD Sep 6 01:24:01.494000 audit: BPF prog-id=57 op=UNLOAD Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.496000 audit: BPF prog-id=101 op=LOAD Sep 6 01:24:01.496000 audit: BPF prog-id=66 op=UNLOAD Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:01.498000 audit: BPF prog-id=102 op=LOAD Sep 6 01:24:01.498000 audit: BPF prog-id=58 op=UNLOAD Sep 6 01:24:01.530827 systemd[1]: Stopping kubelet.service... Sep 6 01:24:01.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:01.551838 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 01:24:01.552474 systemd[1]: Stopped kubelet.service. Sep 6 01:24:01.552655 systemd[1]: kubelet.service: Consumed 1.429s CPU time. Sep 6 01:24:01.558152 systemd[1]: Starting kubelet.service... Sep 6 01:24:02.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:02.817235 systemd[1]: Started kubelet.service. Sep 6 01:24:02.933501 kubelet[2009]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:24:02.934259 kubelet[2009]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Sep 6 01:24:02.934364 kubelet[2009]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:24:02.934624 kubelet[2009]: I0906 01:24:02.934554 2009 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 01:24:02.956537 kubelet[2009]: I0906 01:24:02.956493 2009 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Sep 6 01:24:02.956785 kubelet[2009]: I0906 01:24:02.956743 2009 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 01:24:02.957286 kubelet[2009]: I0906 01:24:02.957260 2009 server.go:934] "Client rotation is on, will bootstrap in background" Sep 6 01:24:02.959927 kubelet[2009]: I0906 01:24:02.959903 2009 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Sep 6 01:24:02.983314 kubelet[2009]: I0906 01:24:02.983274 2009 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 01:24:02.994788 kubelet[2009]: E0906 01:24:02.994718 2009 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 01:24:02.995003 kubelet[2009]: I0906 01:24:02.994978 2009 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 01:24:03.000745 kubelet[2009]: I0906 01:24:03.000704 2009 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 01:24:03.001296 kubelet[2009]: I0906 01:24:03.001274 2009 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Sep 6 01:24:03.001731 kubelet[2009]: I0906 01:24:03.001658 2009 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 01:24:03.002109 kubelet[2009]: I0906 01:24:03.001844 2009 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-bf5vc.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 01:24:03.002374 kubelet[2009]: I0906 01:24:03.002350 2009 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 01:24:03.002484 kubelet[2009]: I0906 01:24:03.002463 2009 container_manager_linux.go:300] "Creating device plugin manager" Sep 6 01:24:03.002672 kubelet[2009]: I0906 01:24:03.002650 2009 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:24:03.003017 kubelet[2009]: I0906 01:24:03.002997 2009 kubelet.go:408] "Attempting to sync node with API server" Sep 6 01:24:03.003270 kubelet[2009]: I0906 01:24:03.003247 2009 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 01:24:03.003415 kubelet[2009]: I0906 01:24:03.003393 2009 kubelet.go:314] "Adding apiserver pod source" Sep 6 01:24:03.003548 kubelet[2009]: I0906 01:24:03.003526 2009 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 01:24:03.009929 kubelet[2009]: I0906 01:24:03.009902 2009 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 01:24:03.010656 kubelet[2009]: I0906 01:24:03.010631 2009 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 01:24:03.011359 kubelet[2009]: I0906 01:24:03.011336 2009 server.go:1274] "Started kubelet" Sep 6 01:24:03.025000 audit[2009]: AVC avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:03.025000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:24:03.025000 audit[2009]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae6030 a1=c000ae43c0 a2=c000ae6000 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:03.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:24:03.025000 audit[2009]: AVC avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:03.025000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:24:03.025000 audit[2009]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aae2e0 a1=c000ae43d8 a2=c000ae60c0 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:03.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:24:03.027316 kubelet[2009]: I0906 01:24:03.026035 2009 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 01:24:03.027316 kubelet[2009]: I0906 01:24:03.026108 2009 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Sep 6 01:24:03.027316 kubelet[2009]: I0906 01:24:03.026160 2009 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 01:24:03.031380 kubelet[2009]: I0906 01:24:03.029742 2009 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 01:24:03.037200 kubelet[2009]: I0906 01:24:03.037149 2009 server.go:449] "Adding debug handlers to kubelet server" Sep 6 01:24:03.044584 kubelet[2009]: I0906 01:24:03.044531 2009 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 01:24:03.044894 kubelet[2009]: I0906 01:24:03.044870 2009 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 01:24:03.045316 kubelet[2009]: I0906 01:24:03.045285 2009 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 01:24:03.061398 kubelet[2009]: I0906 01:24:03.061369 2009 volume_manager.go:289] "Starting Kubelet Volume Manager" Sep 6 01:24:03.062706 kubelet[2009]: E0906 01:24:03.062646 2009 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"srv-bf5vc.gb1.brightbox.com\" not found" Sep 6 01:24:03.068165 kubelet[2009]: I0906 01:24:03.068142 2009 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Sep 6 01:24:03.068564 kubelet[2009]: I0906 01:24:03.068543 2009 reconciler.go:26] "Reconciler: start to sync state" Sep 6 01:24:03.092019 kubelet[2009]: I0906 01:24:03.090852 2009 factory.go:221] Registration of the systemd container factory successfully Sep 6 01:24:03.092825 kubelet[2009]: I0906 01:24:03.092751 2009 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 01:24:03.096451 kubelet[2009]: I0906 01:24:03.096424 2009 factory.go:221] Registration of the containerd container factory successfully Sep 6 01:24:03.109696 kubelet[2009]: I0906 01:24:03.109635 2009 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 01:24:03.114658 kubelet[2009]: I0906 01:24:03.114631 2009 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 01:24:03.114874 kubelet[2009]: I0906 01:24:03.114852 2009 status_manager.go:217] "Starting to sync pod status with apiserver" Sep 6 01:24:03.115010 kubelet[2009]: I0906 01:24:03.114987 2009 kubelet.go:2321] "Starting kubelet main sync loop" Sep 6 01:24:03.115291 kubelet[2009]: E0906 01:24:03.115259 2009 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 01:24:03.195599 kubelet[2009]: I0906 01:24:03.195563 2009 cpu_manager.go:214] "Starting CPU manager" policy="none" Sep 6 01:24:03.195895 kubelet[2009]: I0906 01:24:03.195869 2009 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Sep 6 01:24:03.196037 kubelet[2009]: I0906 01:24:03.196016 2009 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:24:03.196366 kubelet[2009]: I0906 01:24:03.196340 2009 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 6 01:24:03.196504 kubelet[2009]: I0906 01:24:03.196463 2009 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 6 01:24:03.196642 kubelet[2009]: I0906 01:24:03.196589 2009 policy_none.go:49] "None policy: Start" Sep 6 01:24:03.197686 kubelet[2009]: I0906 01:24:03.197663 2009 memory_manager.go:170] "Starting memorymanager" policy="None" Sep 6 01:24:03.197851 kubelet[2009]: I0906 01:24:03.197831 2009 state_mem.go:35] "Initializing new in-memory state store" Sep 6 01:24:03.198242 kubelet[2009]: I0906 01:24:03.198199 2009 state_mem.go:75] "Updated machine memory state" Sep 6 01:24:03.206499 kubelet[2009]: I0906 01:24:03.206461 2009 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 01:24:03.209268 kubelet[2009]: I0906 01:24:03.208883 2009 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 01:24:03.209268 kubelet[2009]: I0906 01:24:03.209159 2009 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 01:24:03.209268 kubelet[2009]: I0906 01:24:03.209182 2009 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 01:24:03.208000 audit[2009]: AVC avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:03.208000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:24:03.208000 audit[2009]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f816b0 a1=c000fef2c0 a2=c000f81680 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:03.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:24:03.211619 kubelet[2009]: I0906 01:24:03.209571 2009 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 01:24:03.260398 kubelet[2009]: W0906 01:24:03.260362 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:24:03.264180 kubelet[2009]: W0906 01:24:03.264142 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:24:03.264568 kubelet[2009]: W0906 01:24:03.264544 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:24:03.371501 kubelet[2009]: I0906 01:24:03.371355 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bc1bfc16ac1d890ae4140619823c875d-kubeconfig\") pod \"kube-scheduler-srv-bf5vc.gb1.brightbox.com\" (UID: \"bc1bfc16ac1d890ae4140619823c875d\") " pod="kube-system/kube-scheduler-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.371909 kubelet[2009]: I0906 01:24:03.371867 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5aad7f0bc09f55f4eef2e5295cbb3547-ca-certs\") pod \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" (UID: \"5aad7f0bc09f55f4eef2e5295cbb3547\") " pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.372139 kubelet[2009]: I0906 01:24:03.372091 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5aad7f0bc09f55f4eef2e5295cbb3547-usr-share-ca-certificates\") pod \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" (UID: \"5aad7f0bc09f55f4eef2e5295cbb3547\") " pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.372327 kubelet[2009]: I0906 01:24:03.372299 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5aad7f0bc09f55f4eef2e5295cbb3547-k8s-certs\") pod \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" (UID: \"5aad7f0bc09f55f4eef2e5295cbb3547\") " pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.372511 kubelet[2009]: I0906 01:24:03.372484 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-ca-certs\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.372688 kubelet[2009]: I0906 01:24:03.372663 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-flexvolume-dir\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.372877 kubelet[2009]: I0906 01:24:03.372852 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-k8s-certs\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.373065 kubelet[2009]: I0906 01:24:03.373040 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-kubeconfig\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.373438 kubelet[2009]: I0906 01:24:03.373408 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4a6d870479bc9fcb0fe08bd8afc7eca0-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-bf5vc.gb1.brightbox.com\" (UID: \"4a6d870479bc9fcb0fe08bd8afc7eca0\") " pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.377395 kubelet[2009]: I0906 01:24:03.377366 2009 kubelet_node_status.go:72] "Attempting to register node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.386681 kubelet[2009]: I0906 01:24:03.386643 2009 kubelet_node_status.go:111] "Node was previously registered" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.387042 kubelet[2009]: I0906 01:24:03.387019 2009 kubelet_node_status.go:75] "Successfully registered node" node="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:03.943000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 6 01:24:03.943000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00095d400 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:03.943000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:04.020437 kubelet[2009]: I0906 01:24:04.020387 2009 apiserver.go:52] "Watching apiserver" Sep 6 01:24:04.069404 kubelet[2009]: I0906 01:24:04.069332 2009 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Sep 6 01:24:04.170046 kubelet[2009]: W0906 01:24:04.170010 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:24:04.170353 kubelet[2009]: E0906 01:24:04.170321 2009 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-bf5vc.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:04.205159 kubelet[2009]: I0906 01:24:04.204979 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-bf5vc.gb1.brightbox.com" podStartSLOduration=1.204926172 podStartE2EDuration="1.204926172s" podCreationTimestamp="2025-09-06 01:24:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:24:04.192058733 +0000 UTC m=+1.354015657" watchObservedRunningTime="2025-09-06 01:24:04.204926172 +0000 UTC m=+1.366883070" Sep 6 01:24:04.225934 kubelet[2009]: I0906 01:24:04.225846 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-bf5vc.gb1.brightbox.com" podStartSLOduration=1.225811746 podStartE2EDuration="1.225811746s" podCreationTimestamp="2025-09-06 01:24:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:24:04.206046733 +0000 UTC m=+1.368003655" watchObservedRunningTime="2025-09-06 01:24:04.225811746 +0000 UTC m=+1.387768643" Sep 6 01:24:04.249025 kubelet[2009]: I0906 01:24:04.248935 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-bf5vc.gb1.brightbox.com" podStartSLOduration=1.248914297 podStartE2EDuration="1.248914297s" podCreationTimestamp="2025-09-06 01:24:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:24:04.232372904 +0000 UTC m=+1.394329806" watchObservedRunningTime="2025-09-06 01:24:04.248914297 +0000 UTC m=+1.410871187" Sep 6 01:24:05.294000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:05.294000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af8640 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:05.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:05.294000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:05.294000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af8660 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:05.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:05.295000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:05.295000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d6dc60 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:05.295000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:05.295000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000af8ac0 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:05.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:05.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:06.530783 kubelet[2009]: I0906 01:24:06.530727 2009 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 6 01:24:06.531971 env[1201]: time="2025-09-06T01:24:06.531905036Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 01:24:06.532569 kubelet[2009]: I0906 01:24:06.532543 2009 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 6 01:24:07.425865 systemd[1]: Created slice kubepods-besteffort-pod3a1f242e_81bf_427f_852a_7228f2360838.slice. Sep 6 01:24:07.505206 kubelet[2009]: I0906 01:24:07.505155 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3a1f242e-81bf-427f-852a-7228f2360838-xtables-lock\") pod \"kube-proxy-bbhtr\" (UID: \"3a1f242e-81bf-427f-852a-7228f2360838\") " pod="kube-system/kube-proxy-bbhtr" Sep 6 01:24:07.505206 kubelet[2009]: I0906 01:24:07.505214 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3a1f242e-81bf-427f-852a-7228f2360838-lib-modules\") pod \"kube-proxy-bbhtr\" (UID: \"3a1f242e-81bf-427f-852a-7228f2360838\") " pod="kube-system/kube-proxy-bbhtr" Sep 6 01:24:07.505537 kubelet[2009]: I0906 01:24:07.505248 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3a1f242e-81bf-427f-852a-7228f2360838-kube-proxy\") pod \"kube-proxy-bbhtr\" (UID: \"3a1f242e-81bf-427f-852a-7228f2360838\") " pod="kube-system/kube-proxy-bbhtr" Sep 6 01:24:07.505537 kubelet[2009]: I0906 01:24:07.505281 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-42jnn\" (UniqueName: \"kubernetes.io/projected/3a1f242e-81bf-427f-852a-7228f2360838-kube-api-access-42jnn\") pod \"kube-proxy-bbhtr\" (UID: \"3a1f242e-81bf-427f-852a-7228f2360838\") " pod="kube-system/kube-proxy-bbhtr" Sep 6 01:24:07.619207 kubelet[2009]: I0906 01:24:07.619156 2009 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 01:24:07.697760 systemd[1]: Created slice kubepods-besteffort-pod1bc8dbf8_ae83_4722_a7e2_5446edc40498.slice. Sep 6 01:24:07.705866 kubelet[2009]: I0906 01:24:07.705790 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1bc8dbf8-ae83-4722-a7e2-5446edc40498-var-lib-calico\") pod \"tigera-operator-58fc44c59b-tt4n6\" (UID: \"1bc8dbf8-ae83-4722-a7e2-5446edc40498\") " pod="tigera-operator/tigera-operator-58fc44c59b-tt4n6" Sep 6 01:24:07.705993 kubelet[2009]: I0906 01:24:07.705901 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sfjz7\" (UniqueName: \"kubernetes.io/projected/1bc8dbf8-ae83-4722-a7e2-5446edc40498-kube-api-access-sfjz7\") pod \"tigera-operator-58fc44c59b-tt4n6\" (UID: \"1bc8dbf8-ae83-4722-a7e2-5446edc40498\") " pod="tigera-operator/tigera-operator-58fc44c59b-tt4n6" Sep 6 01:24:07.735204 env[1201]: time="2025-09-06T01:24:07.735114211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bbhtr,Uid:3a1f242e-81bf-427f-852a-7228f2360838,Namespace:kube-system,Attempt:0,}" Sep 6 01:24:07.768633 env[1201]: time="2025-09-06T01:24:07.768495997Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:07.768879 env[1201]: time="2025-09-06T01:24:07.768664225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:07.768879 env[1201]: time="2025-09-06T01:24:07.768779084Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:07.769227 env[1201]: time="2025-09-06T01:24:07.769170176Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f79b8775ec105c13f89c8e19a0751dbcb4984068bc2d3f7f5dfa1685071a5d48 pid=2062 runtime=io.containerd.runc.v2 Sep 6 01:24:07.810612 systemd[1]: Started cri-containerd-f79b8775ec105c13f89c8e19a0751dbcb4984068bc2d3f7f5dfa1685071a5d48.scope. Sep 6 01:24:07.817167 systemd[1]: run-containerd-runc-k8s.io-f79b8775ec105c13f89c8e19a0751dbcb4984068bc2d3f7f5dfa1685071a5d48-runc.ViawzM.mount: Deactivated successfully. Sep 6 01:24:07.858306 kernel: kauditd_printk_skb: 263 callbacks suppressed Sep 6 01:24:07.858572 kernel: audit: type=1400 audit(1757121847.848:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869533 kernel: audit: type=1400 audit(1757121847.848:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869607 kernel: audit: type=1400 audit(1757121847.848:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.880083 kernel: audit: type=1400 audit(1757121847.848:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.880185 kernel: audit: type=1400 audit(1757121847.848:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.892589 kernel: audit: type=1400 audit(1757121847.848:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.892672 kernel: audit: type=1400 audit(1757121847.848:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.903647 kernel: audit: type=1400 audit(1757121847.848:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.903805 kernel: audit: type=1400 audit(1757121847.848:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.915733 kernel: audit: type=1400 audit(1757121847.857:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.857000 audit: BPF prog-id=103 op=LOAD Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637396238373735656331303563313366383963386531396130373531 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637396238373735656331303563313366383963386531396130373531 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.858000 audit: BPF prog-id=104 op=LOAD Sep 6 01:24:07.858000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00029cd80 items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637396238373735656331303563313366383963386531396130373531 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.863000 audit: BPF prog-id=105 op=LOAD Sep 6 01:24:07.863000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00029cdc8 items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637396238373735656331303563313366383963386531396130373531 Sep 6 01:24:07.868000 audit: BPF prog-id=105 op=UNLOAD Sep 6 01:24:07.868000 audit: BPF prog-id=104 op=UNLOAD Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:07.869000 audit: BPF prog-id=106 op=LOAD Sep 6 01:24:07.869000 audit[2072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00029d1d8 items=0 ppid=2062 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:07.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637396238373735656331303563313366383963386531396130373531 Sep 6 01:24:07.928760 env[1201]: time="2025-09-06T01:24:07.928639409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bbhtr,Uid:3a1f242e-81bf-427f-852a-7228f2360838,Namespace:kube-system,Attempt:0,} returns sandbox id \"f79b8775ec105c13f89c8e19a0751dbcb4984068bc2d3f7f5dfa1685071a5d48\"" Sep 6 01:24:07.936472 env[1201]: time="2025-09-06T01:24:07.936426461Z" level=info msg="CreateContainer within sandbox \"f79b8775ec105c13f89c8e19a0751dbcb4984068bc2d3f7f5dfa1685071a5d48\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 01:24:07.978269 env[1201]: time="2025-09-06T01:24:07.978097133Z" level=info msg="CreateContainer within sandbox \"f79b8775ec105c13f89c8e19a0751dbcb4984068bc2d3f7f5dfa1685071a5d48\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3105abc633f24ead627a4a1745a8164c288a6bd98bbf3b312722f3672433e447\"" Sep 6 01:24:07.982255 env[1201]: time="2025-09-06T01:24:07.982054292Z" level=info msg="StartContainer for \"3105abc633f24ead627a4a1745a8164c288a6bd98bbf3b312722f3672433e447\"" Sep 6 01:24:08.002986 env[1201]: time="2025-09-06T01:24:08.002921411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-58fc44c59b-tt4n6,Uid:1bc8dbf8-ae83-4722-a7e2-5446edc40498,Namespace:tigera-operator,Attempt:0,}" Sep 6 01:24:08.017565 systemd[1]: Started cri-containerd-3105abc633f24ead627a4a1745a8164c288a6bd98bbf3b312722f3672433e447.scope. Sep 6 01:24:08.039598 env[1201]: time="2025-09-06T01:24:08.037769871Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:08.039598 env[1201]: time="2025-09-06T01:24:08.037841908Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:08.039598 env[1201]: time="2025-09-06T01:24:08.037860074Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:08.039598 env[1201]: time="2025-09-06T01:24:08.038198578Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8f40e3b46156f9de1f603672da9ea8ee90c0bbc1d484e7f09f3b924d7c22fda pid=2123 runtime=io.containerd.runc.v2 Sep 6 01:24:08.065212 systemd[1]: Started cri-containerd-c8f40e3b46156f9de1f603672da9ea8ee90c0bbc1d484e7f09f3b924d7c22fda.scope. Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f76ff3b52f8 items=0 ppid=2062 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331303561626336333366323465616436323761346131373435613831 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.078000 audit: BPF prog-id=107 op=LOAD Sep 6 01:24:08.078000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024238 items=0 ppid=2062 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331303561626336333366323465616436323761346131373435613831 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit: BPF prog-id=108 op=LOAD Sep 6 01:24:08.079000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024288 items=0 ppid=2062 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331303561626336333366323465616436323761346131373435613831 Sep 6 01:24:08.079000 audit: BPF prog-id=108 op=UNLOAD Sep 6 01:24:08.079000 audit: BPF prog-id=107 op=UNLOAD Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.079000 audit: BPF prog-id=109 op=LOAD Sep 6 01:24:08.079000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024318 items=0 ppid=2062 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331303561626336333366323465616436323761346131373435613831 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.101000 audit: BPF prog-id=110 op=LOAD Sep 6 01:24:08.102000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.102000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2123 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663430653362343631353666396465316636303336373264613965 Sep 6 01:24:08.102000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.102000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2123 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663430653362343631353666396465316636303336373264613965 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.103000 audit: BPF prog-id=111 op=LOAD Sep 6 01:24:08.103000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000396f00 items=0 ppid=2123 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663430653362343631353666396465316636303336373264613965 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.104000 audit: BPF prog-id=112 op=LOAD Sep 6 01:24:08.104000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000396f48 items=0 ppid=2123 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663430653362343631353666396465316636303336373264613965 Sep 6 01:24:08.105000 audit: BPF prog-id=112 op=UNLOAD Sep 6 01:24:08.105000 audit: BPF prog-id=111 op=UNLOAD Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { perfmon } for pid=2140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit[2140]: AVC avc: denied { bpf } for pid=2140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:08.105000 audit: BPF prog-id=113 op=LOAD Sep 6 01:24:08.105000 audit[2140]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000397358 items=0 ppid=2123 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338663430653362343631353666396465316636303336373264613965 Sep 6 01:24:08.120237 env[1201]: time="2025-09-06T01:24:08.120175920Z" level=info msg="StartContainer for \"3105abc633f24ead627a4a1745a8164c288a6bd98bbf3b312722f3672433e447\" returns successfully" Sep 6 01:24:08.161607 env[1201]: time="2025-09-06T01:24:08.161535515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-58fc44c59b-tt4n6,Uid:1bc8dbf8-ae83-4722-a7e2-5446edc40498,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c8f40e3b46156f9de1f603672da9ea8ee90c0bbc1d484e7f09f3b924d7c22fda\"" Sep 6 01:24:08.167225 env[1201]: time="2025-09-06T01:24:08.167187226Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 6 01:24:08.341347 kubelet[2009]: I0906 01:24:08.341182 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-bbhtr" podStartSLOduration=1.34116243 podStartE2EDuration="1.34116243s" podCreationTimestamp="2025-09-06 01:24:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:24:08.190902779 +0000 UTC m=+5.352859689" watchObservedRunningTime="2025-09-06 01:24:08.34116243 +0000 UTC m=+5.503119329" Sep 6 01:24:08.493000 audit[2207]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.493000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe79a23130 a2=0 a3=7ffe79a2311c items=0 ppid=2130 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:24:08.495000 audit[2208]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.495000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda673f3c0 a2=0 a3=7ffda673f3ac items=0 ppid=2130 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:24:08.497000 audit[2209]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.497000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8e15f230 a2=0 a3=7ffd8e15f21c items=0 ppid=2130 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:24:08.498000 audit[2210]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.498000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3a678cb0 a2=0 a3=7ffc3a678c9c items=0 ppid=2130 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.498000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:24:08.505000 audit[2211]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.505000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff72809a30 a2=0 a3=7fff72809a1c items=0 ppid=2130 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:24:08.510000 audit[2212]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.510000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf9e91d20 a2=0 a3=7ffcf9e91d0c items=0 ppid=2130 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:24:08.603000 audit[2213]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.603000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd2b03fb0 a2=0 a3=7ffdd2b03f9c items=0 ppid=2130 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:24:08.609000 audit[2215]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.609000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff60ac7b50 a2=0 a3=7fff60ac7b3c items=0 ppid=2130 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 01:24:08.615000 audit[2218]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.615000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe45ae9930 a2=0 a3=7ffe45ae991c items=0 ppid=2130 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 01:24:08.617000 audit[2219]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.617000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd37918a30 a2=0 a3=7ffd37918a1c items=0 ppid=2130 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:24:08.630000 audit[2221]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.630000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc21239640 a2=0 a3=7ffc2123962c items=0 ppid=2130 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:24:08.632000 audit[2222]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.632000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdeeca4900 a2=0 a3=7ffdeeca48ec items=0 ppid=2130 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:24:08.638000 audit[2225]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.638000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd55724840 a2=0 a3=7ffd5572482c items=0 ppid=2130 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:24:08.644000 audit[2228]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.644000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4e256550 a2=0 a3=7fff4e25653c items=0 ppid=2130 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 01:24:08.646000 audit[2229]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.646000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe517e32c0 a2=0 a3=7ffe517e32ac items=0 ppid=2130 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:24:08.650000 audit[2231]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.650000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbd4cc390 a2=0 a3=7ffcbd4cc37c items=0 ppid=2130 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:24:08.652000 audit[2232]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.652000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdfd0f0e0 a2=0 a3=7ffcdfd0f0cc items=0 ppid=2130 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:24:08.656000 audit[2234]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.656000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc87cbf620 a2=0 a3=7ffc87cbf60c items=0 ppid=2130 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:24:08.663000 audit[2237]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.663000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7e50a420 a2=0 a3=7ffd7e50a40c items=0 ppid=2130 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:24:08.669000 audit[2240]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.669000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb121f3d0 a2=0 a3=7ffcb121f3bc items=0 ppid=2130 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:24:08.671000 audit[2241]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.671000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe3ae0c090 a2=0 a3=7ffe3ae0c07c items=0 ppid=2130 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:24:08.675000 audit[2243]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.675000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe9f81cd40 a2=0 a3=7ffe9f81cd2c items=0 ppid=2130 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:08.681000 audit[2246]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.681000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7d7adc50 a2=0 a3=7ffc7d7adc3c items=0 ppid=2130 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:08.683000 audit[2247]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.683000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb5842520 a2=0 a3=7ffcb584250c items=0 ppid=2130 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:24:08.687000 audit[2249]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:24:08.687000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffed3d9ea30 a2=0 a3=7ffed3d9ea1c items=0 ppid=2130 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:24:08.730000 audit[2255]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:08.730000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff84d8ba60 a2=0 a3=7fff84d8ba4c items=0 ppid=2130 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:08.742000 audit[2255]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:08.742000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff84d8ba60 a2=0 a3=7fff84d8ba4c items=0 ppid=2130 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:08.745000 audit[2260]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.745000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd5122a370 a2=0 a3=7ffd5122a35c items=0 ppid=2130 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:24:08.749000 audit[2262]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.749000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd22a90f90 a2=0 a3=7ffd22a90f7c items=0 ppid=2130 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 01:24:08.756000 audit[2265]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.756000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf2c7bf60 a2=0 a3=7ffdf2c7bf4c items=0 ppid=2130 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 01:24:08.757000 audit[2266]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.757000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2b8170c0 a2=0 a3=7fff2b8170ac items=0 ppid=2130 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:24:08.761000 audit[2268]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.761000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5ff6b7f0 a2=0 a3=7ffc5ff6b7dc items=0 ppid=2130 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:24:08.763000 audit[2269]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.763000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2ae3e9c0 a2=0 a3=7ffd2ae3e9ac items=0 ppid=2130 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:24:08.767000 audit[2271]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.767000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc198bf9b0 a2=0 a3=7ffc198bf99c items=0 ppid=2130 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 01:24:08.773000 audit[2274]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.773000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc7c87fae0 a2=0 a3=7ffc7c87facc items=0 ppid=2130 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:24:08.775000 audit[2275]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.775000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5d219850 a2=0 a3=7ffd5d21983c items=0 ppid=2130 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:24:08.779000 audit[2277]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.779000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff10c68d90 a2=0 a3=7fff10c68d7c items=0 ppid=2130 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:24:08.781000 audit[2278]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.781000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe17492a30 a2=0 a3=7ffe17492a1c items=0 ppid=2130 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:24:08.785000 audit[2280]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.785000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe99fed950 a2=0 a3=7ffe99fed93c items=0 ppid=2130 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:24:08.790000 audit[2283]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.790000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8f3cceb0 a2=0 a3=7ffc8f3cce9c items=0 ppid=2130 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:24:08.796000 audit[2286]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.796000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc137c26b0 a2=0 a3=7ffc137c269c items=0 ppid=2130 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 01:24:08.799000 audit[2287]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.799000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec0ba0120 a2=0 a3=7ffec0ba010c items=0 ppid=2130 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:24:08.805000 audit[2289]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.805000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe768b9d20 a2=0 a3=7ffe768b9d0c items=0 ppid=2130 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:08.810000 audit[2292]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.810000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb07582b0 a2=0 a3=7ffcb075829c items=0 ppid=2130 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:24:08.812000 audit[2293]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.812000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4192fdd0 a2=0 a3=7ffd4192fdbc items=0 ppid=2130 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:24:08.817000 audit[2295]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.817000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec5e700a0 a2=0 a3=7ffec5e7008c items=0 ppid=2130 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:24:08.819000 audit[2296]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.819000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc2cd3fb0 a2=0 a3=7ffdc2cd3f9c items=0 ppid=2130 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:24:08.823000 audit[2298]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.823000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff52028010 a2=0 a3=7fff52027ffc items=0 ppid=2130 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:24:08.828000 audit[2301]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:24:08.828000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd60fab60 a2=0 a3=7fffd60fab4c items=0 ppid=2130 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:24:08.833000 audit[2303]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:24:08.833000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffee566efc0 a2=0 a3=7ffee566efac items=0 ppid=2130 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.833000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:08.835000 audit[2303]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:24:08.835000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffee566efc0 a2=0 a3=7ffee566efac items=0 ppid=2130 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:08.835000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:09.725545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2425753280.mount: Deactivated successfully. Sep 6 01:24:11.470534 env[1201]: time="2025-09-06T01:24:11.470468218Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:11.472692 env[1201]: time="2025-09-06T01:24:11.472658502Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:11.474592 env[1201]: time="2025-09-06T01:24:11.474558559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:11.476529 env[1201]: time="2025-09-06T01:24:11.476476919Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:11.477748 env[1201]: time="2025-09-06T01:24:11.477677448Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 6 01:24:11.483213 env[1201]: time="2025-09-06T01:24:11.483161337Z" level=info msg="CreateContainer within sandbox \"c8f40e3b46156f9de1f603672da9ea8ee90c0bbc1d484e7f09f3b924d7c22fda\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 6 01:24:11.496328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2902865115.mount: Deactivated successfully. Sep 6 01:24:11.504747 env[1201]: time="2025-09-06T01:24:11.504650908Z" level=info msg="CreateContainer within sandbox \"c8f40e3b46156f9de1f603672da9ea8ee90c0bbc1d484e7f09f3b924d7c22fda\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"cdae186d5ace6e2120d168a8dfec6f0f5f43ac0e6a42bc5c15d495e35b1fd7d2\"" Sep 6 01:24:11.508284 env[1201]: time="2025-09-06T01:24:11.507340652Z" level=info msg="StartContainer for \"cdae186d5ace6e2120d168a8dfec6f0f5f43ac0e6a42bc5c15d495e35b1fd7d2\"" Sep 6 01:24:11.545762 systemd[1]: Started cri-containerd-cdae186d5ace6e2120d168a8dfec6f0f5f43ac0e6a42bc5c15d495e35b1fd7d2.scope. Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.631000 audit: BPF prog-id=114 op=LOAD Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2123 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364616531383664356163653665323132306431363861386466656336 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2123 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364616531383664356163653665323132306431363861386466656336 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit: BPF prog-id=115 op=LOAD Sep 6 01:24:11.632000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000396790 items=0 ppid=2123 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364616531383664356163653665323132306431363861386466656336 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.632000 audit: BPF prog-id=116 op=LOAD Sep 6 01:24:11.632000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003967d8 items=0 ppid=2123 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364616531383664356163653665323132306431363861386466656336 Sep 6 01:24:11.632000 audit: BPF prog-id=116 op=UNLOAD Sep 6 01:24:11.632000 audit: BPF prog-id=115 op=UNLOAD Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:11.633000 audit: BPF prog-id=117 op=LOAD Sep 6 01:24:11.633000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000396be8 items=0 ppid=2123 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:11.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364616531383664356163653665323132306431363861386466656336 Sep 6 01:24:11.659439 env[1201]: time="2025-09-06T01:24:11.659351454Z" level=info msg="StartContainer for \"cdae186d5ace6e2120d168a8dfec6f0f5f43ac0e6a42bc5c15d495e35b1fd7d2\" returns successfully" Sep 6 01:24:12.493493 systemd[1]: run-containerd-runc-k8s.io-cdae186d5ace6e2120d168a8dfec6f0f5f43ac0e6a42bc5c15d495e35b1fd7d2-runc.ERiQEB.mount: Deactivated successfully. Sep 6 01:24:19.001390 sudo[1381]: pam_unix(sudo:session): session closed for user root Sep 6 01:24:19.018105 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 6 01:24:19.018560 kernel: audit: type=1106 audit(1757121859.000:922): pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:19.000000 audit[1381]: USER_END pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:19.001000 audit[1381]: CRED_DISP pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:19.034735 kernel: audit: type=1104 audit(1757121859.001:923): pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:24:19.180487 sshd[1378]: pam_unix(sshd:session): session closed for user core Sep 6 01:24:19.199605 kernel: audit: type=1106 audit(1757121859.190:924): pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:24:19.190000 audit[1378]: USER_END pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:24:19.190000 audit[1378]: CRED_DISP pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:24:19.201551 systemd[1]: sshd@8-10.230.79.10:22-139.178.89.65:41556.service: Deactivated successfully. Sep 6 01:24:19.221521 kernel: audit: type=1104 audit(1757121859.190:925): pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:24:19.203172 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 01:24:19.203500 systemd[1]: session-9.scope: Consumed 6.933s CPU time. Sep 6 01:24:19.222994 systemd-logind[1190]: Session 9 logged out. Waiting for processes to exit. Sep 6 01:24:19.234877 kernel: audit: type=1131 audit(1757121859.201:926): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.79.10:22-139.178.89.65:41556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:19.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.79.10:22-139.178.89.65:41556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:24:19.226408 systemd-logind[1190]: Removed session 9. Sep 6 01:24:20.513000 audit[2388]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:20.522743 kernel: audit: type=1325 audit(1757121860.513:927): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:20.513000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb5c97f60 a2=0 a3=7ffcb5c97f4c items=0 ppid=2130 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.531746 kernel: audit: type=1300 audit(1757121860.513:927): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb5c97f60 a2=0 a3=7ffcb5c97f4c items=0 ppid=2130 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:20.536742 kernel: audit: type=1327 audit(1757121860.513:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:20.551000 audit[2388]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:20.556833 kernel: audit: type=1325 audit(1757121860.551:928): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:20.551000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb5c97f60 a2=0 a3=0 items=0 ppid=2130 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.566824 kernel: audit: type=1300 audit(1757121860.551:928): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb5c97f60 a2=0 a3=0 items=0 ppid=2130 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:20.596000 audit[2390]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:20.596000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffeea6bb0f0 a2=0 a3=7ffeea6bb0dc items=0 ppid=2130 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:20.604000 audit[2390]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:20.604000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeea6bb0f0 a2=0 a3=0 items=0 ppid=2130 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:20.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:23.714000 audit[2393]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:23.714000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffd53bd040 a2=0 a3=7fffd53bd02c items=0 ppid=2130 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:23.720000 audit[2393]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:23.720000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffd53bd040 a2=0 a3=0 items=0 ppid=2130 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:23.750975 kubelet[2009]: I0906 01:24:23.750895 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-58fc44c59b-tt4n6" podStartSLOduration=13.435259301 podStartE2EDuration="16.750839705s" podCreationTimestamp="2025-09-06 01:24:07 +0000 UTC" firstStartedPulling="2025-09-06 01:24:08.163626027 +0000 UTC m=+5.325582915" lastFinishedPulling="2025-09-06 01:24:11.479206426 +0000 UTC m=+8.641163319" observedRunningTime="2025-09-06 01:24:12.219548349 +0000 UTC m=+9.381505262" watchObservedRunningTime="2025-09-06 01:24:23.750839705 +0000 UTC m=+20.912796602" Sep 6 01:24:23.767359 systemd[1]: Created slice kubepods-besteffort-pod487bbbe6_b1ae_4e9b_be3a_2a47fba1e7b8.slice. Sep 6 01:24:23.819000 audit[2395]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:23.819000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc8076b400 a2=0 a3=7ffc8076b3ec items=0 ppid=2130 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:23.823000 audit[2395]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:23.823000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc8076b400 a2=0 a3=0 items=0 ppid=2130 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:23.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:23.914300 kubelet[2009]: I0906 01:24:23.914210 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pcc9g\" (UniqueName: \"kubernetes.io/projected/487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8-kube-api-access-pcc9g\") pod \"calico-typha-857b94cd8b-tj95j\" (UID: \"487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8\") " pod="calico-system/calico-typha-857b94cd8b-tj95j" Sep 6 01:24:23.914634 kubelet[2009]: I0906 01:24:23.914583 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8-typha-certs\") pod \"calico-typha-857b94cd8b-tj95j\" (UID: \"487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8\") " pod="calico-system/calico-typha-857b94cd8b-tj95j" Sep 6 01:24:23.914917 kubelet[2009]: I0906 01:24:23.914889 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8-tigera-ca-bundle\") pod \"calico-typha-857b94cd8b-tj95j\" (UID: \"487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8\") " pod="calico-system/calico-typha-857b94cd8b-tj95j" Sep 6 01:24:24.064932 systemd[1]: Created slice kubepods-besteffort-podbe9dddb4_d6e8_416c_b4d0_a24125c6c540.slice. Sep 6 01:24:24.103058 env[1201]: time="2025-09-06T01:24:24.101750376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-857b94cd8b-tj95j,Uid:487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:24.151400 env[1201]: time="2025-09-06T01:24:24.151250101Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:24.151676 env[1201]: time="2025-09-06T01:24:24.151378759Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:24.151888 env[1201]: time="2025-09-06T01:24:24.151829286Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:24.155092 env[1201]: time="2025-09-06T01:24:24.154994268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4b08450df1977efd12868729eb3c823aea1208d25a6fd8df834185c47bccf0e pid=2405 runtime=io.containerd.runc.v2 Sep 6 01:24:24.202846 systemd[1]: Started cri-containerd-d4b08450df1977efd12868729eb3c823aea1208d25a6fd8df834185c47bccf0e.scope. Sep 6 01:24:24.216818 kubelet[2009]: I0906 01:24:24.216735 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-cni-bin-dir\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217004 kubelet[2009]: I0906 01:24:24.216878 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-policysync\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217004 kubelet[2009]: I0906 01:24:24.216915 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-cni-log-dir\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217123 kubelet[2009]: I0906 01:24:24.217004 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-var-run-calico\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217123 kubelet[2009]: I0906 01:24:24.217060 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-lib-modules\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217232 kubelet[2009]: I0906 01:24:24.217138 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/be9dddb4-d6e8-416c-b4d0-a24125c6c540-node-certs\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217232 kubelet[2009]: I0906 01:24:24.217165 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-xtables-lock\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217326 kubelet[2009]: I0906 01:24:24.217276 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-flexvol-driver-host\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217326 kubelet[2009]: I0906 01:24:24.217308 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/be9dddb4-d6e8-416c-b4d0-a24125c6c540-tigera-ca-bundle\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217442 kubelet[2009]: I0906 01:24:24.217380 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hdzfn\" (UniqueName: \"kubernetes.io/projected/be9dddb4-d6e8-416c-b4d0-a24125c6c540-kube-api-access-hdzfn\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217547 kubelet[2009]: I0906 01:24:24.217471 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-var-lib-calico\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.217623 kubelet[2009]: I0906 01:24:24.217562 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/be9dddb4-d6e8-416c-b4d0-a24125c6c540-cni-net-dir\") pod \"calico-node-n726l\" (UID: \"be9dddb4-d6e8-416c-b4d0-a24125c6c540\") " pod="calico-system/calico-node-n726l" Sep 6 01:24:24.272117 kernel: kauditd_printk_skb: 19 callbacks suppressed Sep 6 01:24:24.273011 kernel: audit: type=1400 audit(1757121864.260:935): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281742 kernel: audit: type=1400 audit(1757121864.260:936): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.289742 kernel: audit: type=1400 audit(1757121864.260:937): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.298741 kernel: audit: type=1400 audit(1757121864.260:938): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.306742 kernel: audit: type=1400 audit(1757121864.260:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.312739 kernel: audit: type=1400 audit(1757121864.260:940): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.323135 kernel: audit: type=1400 audit(1757121864.260:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.332878 kernel: audit: type=1400 audit(1757121864.260:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.340761 kernel: audit: type=1400 audit(1757121864.260:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.342408 kubelet[2009]: E0906 01:24:24.342235 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.342408 kubelet[2009]: W0906 01:24:24.342282 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.342408 kubelet[2009]: E0906 01:24:24.342334 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.353777 kernel: audit: type=1400 audit(1757121864.274:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.274000 audit: BPF prog-id=118 op=LOAD Sep 6 01:24:24.275000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.275000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2405 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623038343530646631393737656664313238363837323965623363 Sep 6 01:24:24.275000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.275000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2405 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623038343530646631393737656664313238363837323965623363 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.276000 audit: BPF prog-id=119 op=LOAD Sep 6 01:24:24.276000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003d2850 items=0 ppid=2405 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623038343530646631393737656664313238363837323965623363 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.281000 audit: BPF prog-id=120 op=LOAD Sep 6 01:24:24.281000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003d2898 items=0 ppid=2405 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623038343530646631393737656664313238363837323965623363 Sep 6 01:24:24.281000 audit: BPF prog-id=120 op=UNLOAD Sep 6 01:24:24.282000 audit: BPF prog-id=119 op=UNLOAD Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.282000 audit: BPF prog-id=121 op=LOAD Sep 6 01:24:24.282000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003d2ca8 items=0 ppid=2405 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623038343530646631393737656664313238363837323965623363 Sep 6 01:24:24.373243 env[1201]: time="2025-09-06T01:24:24.373171724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-857b94cd8b-tj95j,Uid:487bbbe6-b1ae-4e9b-be3a-2a47fba1e7b8,Namespace:calico-system,Attempt:0,} returns sandbox id \"d4b08450df1977efd12868729eb3c823aea1208d25a6fd8df834185c47bccf0e\"" Sep 6 01:24:24.377827 env[1201]: time="2025-09-06T01:24:24.377780884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 6 01:24:24.391425 kubelet[2009]: E0906 01:24:24.391385 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.391425 kubelet[2009]: W0906 01:24:24.391415 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.391678 kubelet[2009]: E0906 01:24:24.391442 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.488522 kubelet[2009]: E0906 01:24:24.488455 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:24.518645 kubelet[2009]: E0906 01:24:24.518582 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.518645 kubelet[2009]: W0906 01:24:24.518633 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.518925 kubelet[2009]: E0906 01:24:24.518662 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.519129 kubelet[2009]: E0906 01:24:24.519100 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.519227 kubelet[2009]: W0906 01:24:24.519121 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.519227 kubelet[2009]: E0906 01:24:24.519162 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.519509 kubelet[2009]: E0906 01:24:24.519450 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.519509 kubelet[2009]: W0906 01:24:24.519478 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.519509 kubelet[2009]: E0906 01:24:24.519494 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.519850 kubelet[2009]: E0906 01:24:24.519801 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.519850 kubelet[2009]: W0906 01:24:24.519842 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.520644 kubelet[2009]: E0906 01:24:24.519859 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.520644 kubelet[2009]: E0906 01:24:24.520212 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.520644 kubelet[2009]: W0906 01:24:24.520227 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.520644 kubelet[2009]: E0906 01:24:24.520243 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.520644 kubelet[2009]: E0906 01:24:24.520508 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.520644 kubelet[2009]: W0906 01:24:24.520523 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.520644 kubelet[2009]: E0906 01:24:24.520538 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.521137 kubelet[2009]: E0906 01:24:24.520816 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.521137 kubelet[2009]: W0906 01:24:24.520832 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.521137 kubelet[2009]: E0906 01:24:24.520847 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.521537 kubelet[2009]: E0906 01:24:24.521509 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.521537 kubelet[2009]: W0906 01:24:24.521529 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.521696 kubelet[2009]: E0906 01:24:24.521546 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.521897 kubelet[2009]: E0906 01:24:24.521870 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.521897 kubelet[2009]: W0906 01:24:24.521890 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.522044 kubelet[2009]: E0906 01:24:24.521906 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.522181 kubelet[2009]: E0906 01:24:24.522157 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.522264 kubelet[2009]: W0906 01:24:24.522182 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.522264 kubelet[2009]: E0906 01:24:24.522198 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.522532 kubelet[2009]: E0906 01:24:24.522497 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.522532 kubelet[2009]: W0906 01:24:24.522525 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.522695 kubelet[2009]: E0906 01:24:24.522549 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.524894 kubelet[2009]: E0906 01:24:24.524862 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.524894 kubelet[2009]: W0906 01:24:24.524885 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.525032 kubelet[2009]: E0906 01:24:24.524902 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.525884 kubelet[2009]: E0906 01:24:24.525857 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.525884 kubelet[2009]: W0906 01:24:24.525878 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.526038 kubelet[2009]: E0906 01:24:24.525895 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.526871 kubelet[2009]: E0906 01:24:24.526845 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.526871 kubelet[2009]: W0906 01:24:24.526868 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.527052 kubelet[2009]: E0906 01:24:24.526886 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.528877 kubelet[2009]: E0906 01:24:24.528838 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.528877 kubelet[2009]: W0906 01:24:24.528871 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.529076 kubelet[2009]: E0906 01:24:24.528888 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.529749 kubelet[2009]: E0906 01:24:24.529708 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.529749 kubelet[2009]: W0906 01:24:24.529742 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.529918 kubelet[2009]: E0906 01:24:24.529758 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.530206 kubelet[2009]: E0906 01:24:24.530159 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.530206 kubelet[2009]: W0906 01:24:24.530193 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.530443 kubelet[2009]: E0906 01:24:24.530212 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.530745 kubelet[2009]: E0906 01:24:24.530686 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.530745 kubelet[2009]: W0906 01:24:24.530706 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.530745 kubelet[2009]: E0906 01:24:24.530740 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.531028 kubelet[2009]: E0906 01:24:24.531005 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.531028 kubelet[2009]: W0906 01:24:24.531023 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.531179 kubelet[2009]: E0906 01:24:24.531039 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.531335 kubelet[2009]: E0906 01:24:24.531313 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.531335 kubelet[2009]: W0906 01:24:24.531331 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.531470 kubelet[2009]: E0906 01:24:24.531346 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.532358 kubelet[2009]: E0906 01:24:24.532337 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.532358 kubelet[2009]: W0906 01:24:24.532357 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.532517 kubelet[2009]: E0906 01:24:24.532373 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.532517 kubelet[2009]: I0906 01:24:24.532419 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2508492e-0028-4e46-b00a-9f1d7bcf3f9b-socket-dir\") pod \"csi-node-driver-f4kjd\" (UID: \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\") " pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:24.532894 kubelet[2009]: E0906 01:24:24.532851 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.532894 kubelet[2009]: W0906 01:24:24.532887 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.533041 kubelet[2009]: E0906 01:24:24.532912 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.533041 kubelet[2009]: I0906 01:24:24.532937 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2508492e-0028-4e46-b00a-9f1d7bcf3f9b-varrun\") pod \"csi-node-driver-f4kjd\" (UID: \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\") " pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:24.533774 kubelet[2009]: E0906 01:24:24.533748 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.533774 kubelet[2009]: W0906 01:24:24.533770 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.533924 kubelet[2009]: E0906 01:24:24.533794 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.533924 kubelet[2009]: I0906 01:24:24.533833 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2508492e-0028-4e46-b00a-9f1d7bcf3f9b-registration-dir\") pod \"csi-node-driver-f4kjd\" (UID: \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\") " pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:24.534268 kubelet[2009]: E0906 01:24:24.534239 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.534268 kubelet[2009]: W0906 01:24:24.534262 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.534543 kubelet[2009]: E0906 01:24:24.534428 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.534543 kubelet[2009]: I0906 01:24:24.534488 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zgbs2\" (UniqueName: \"kubernetes.io/projected/2508492e-0028-4e46-b00a-9f1d7bcf3f9b-kube-api-access-zgbs2\") pod \"csi-node-driver-f4kjd\" (UID: \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\") " pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:24.536405 kubelet[2009]: E0906 01:24:24.536367 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.536405 kubelet[2009]: W0906 01:24:24.536400 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.536580 kubelet[2009]: E0906 01:24:24.536550 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.538829 kubelet[2009]: E0906 01:24:24.538791 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.538829 kubelet[2009]: W0906 01:24:24.538824 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.538980 kubelet[2009]: E0906 01:24:24.538952 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.539276 kubelet[2009]: E0906 01:24:24.539222 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.539276 kubelet[2009]: W0906 01:24:24.539244 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.539679 kubelet[2009]: E0906 01:24:24.539634 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.540075 kubelet[2009]: E0906 01:24:24.540047 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.540075 kubelet[2009]: W0906 01:24:24.540070 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.540365 kubelet[2009]: E0906 01:24:24.540333 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.540365 kubelet[2009]: W0906 01:24:24.540359 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.541276 kubelet[2009]: E0906 01:24:24.541238 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.541746 kubelet[2009]: W0906 01:24:24.541343 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.541746 kubelet[2009]: E0906 01:24:24.541375 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.541746 kubelet[2009]: E0906 01:24:24.541611 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.541943 kubelet[2009]: I0906 01:24:24.541744 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2508492e-0028-4e46-b00a-9f1d7bcf3f9b-kubelet-dir\") pod \"csi-node-driver-f4kjd\" (UID: \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\") " pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:24.541943 kubelet[2009]: E0906 01:24:24.541765 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.542071 kubelet[2009]: E0906 01:24:24.542010 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.542071 kubelet[2009]: W0906 01:24:24.542024 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.542071 kubelet[2009]: E0906 01:24:24.542039 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.543120 kubelet[2009]: E0906 01:24:24.543091 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.543120 kubelet[2009]: W0906 01:24:24.543117 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.543256 kubelet[2009]: E0906 01:24:24.543149 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.543532 kubelet[2009]: E0906 01:24:24.543475 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.543532 kubelet[2009]: W0906 01:24:24.543511 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.543532 kubelet[2009]: E0906 01:24:24.543527 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.545236 kubelet[2009]: E0906 01:24:24.545191 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.545236 kubelet[2009]: W0906 01:24:24.545213 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.545236 kubelet[2009]: E0906 01:24:24.545231 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.545523 kubelet[2009]: E0906 01:24:24.545485 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.545523 kubelet[2009]: W0906 01:24:24.545518 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.545661 kubelet[2009]: E0906 01:24:24.545534 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.643494 kubelet[2009]: E0906 01:24:24.643372 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.643494 kubelet[2009]: W0906 01:24:24.643403 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.643494 kubelet[2009]: E0906 01:24:24.643433 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.648147 kubelet[2009]: E0906 01:24:24.648118 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.648147 kubelet[2009]: W0906 01:24:24.648143 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.648358 kubelet[2009]: E0906 01:24:24.648173 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.648501 kubelet[2009]: E0906 01:24:24.648478 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.648501 kubelet[2009]: W0906 01:24:24.648497 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.648661 kubelet[2009]: E0906 01:24:24.648616 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.649860 kubelet[2009]: E0906 01:24:24.649835 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.649979 kubelet[2009]: W0906 01:24:24.649953 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.650154 kubelet[2009]: E0906 01:24:24.650122 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.650519 kubelet[2009]: E0906 01:24:24.650497 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.650638 kubelet[2009]: W0906 01:24:24.650614 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.650819 kubelet[2009]: E0906 01:24:24.650774 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.651152 kubelet[2009]: E0906 01:24:24.651130 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.651291 kubelet[2009]: W0906 01:24:24.651266 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.651444 kubelet[2009]: E0906 01:24:24.651414 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.651853 kubelet[2009]: E0906 01:24:24.651831 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.652004 kubelet[2009]: W0906 01:24:24.651979 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.652154 kubelet[2009]: E0906 01:24:24.652125 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.652573 kubelet[2009]: E0906 01:24:24.652481 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.652845 kubelet[2009]: W0906 01:24:24.652819 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.653020 kubelet[2009]: E0906 01:24:24.652989 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.653358 kubelet[2009]: E0906 01:24:24.653337 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.653481 kubelet[2009]: W0906 01:24:24.653457 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.653649 kubelet[2009]: E0906 01:24:24.653619 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.654024 kubelet[2009]: E0906 01:24:24.654003 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.654202 kubelet[2009]: W0906 01:24:24.654131 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.654357 kubelet[2009]: E0906 01:24:24.654327 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.654781 kubelet[2009]: E0906 01:24:24.654760 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.654962 kubelet[2009]: W0906 01:24:24.654937 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.655122 kubelet[2009]: E0906 01:24:24.655092 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.655442 kubelet[2009]: E0906 01:24:24.655422 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.655573 kubelet[2009]: W0906 01:24:24.655549 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.655751 kubelet[2009]: E0906 01:24:24.655704 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.656093 kubelet[2009]: E0906 01:24:24.656072 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.656224 kubelet[2009]: W0906 01:24:24.656199 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.656393 kubelet[2009]: E0906 01:24:24.656363 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.656782 kubelet[2009]: E0906 01:24:24.656761 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.656934 kubelet[2009]: W0906 01:24:24.656910 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.657077 kubelet[2009]: E0906 01:24:24.657046 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.657385 kubelet[2009]: E0906 01:24:24.657364 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.657497 kubelet[2009]: W0906 01:24:24.657473 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.657660 kubelet[2009]: E0906 01:24:24.657607 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.659356 kubelet[2009]: E0906 01:24:24.659333 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.659495 kubelet[2009]: W0906 01:24:24.659470 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.659785 kubelet[2009]: E0906 01:24:24.659703 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.663943 kubelet[2009]: E0906 01:24:24.663839 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.663943 kubelet[2009]: W0906 01:24:24.663861 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.664141 kubelet[2009]: E0906 01:24:24.664037 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.664684 kubelet[2009]: E0906 01:24:24.664589 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.664684 kubelet[2009]: W0906 01:24:24.664612 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.664926 kubelet[2009]: E0906 01:24:24.664898 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.665227 kubelet[2009]: E0906 01:24:24.665194 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.665227 kubelet[2009]: W0906 01:24:24.665215 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.665420 kubelet[2009]: E0906 01:24:24.665345 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.665912 kubelet[2009]: E0906 01:24:24.665887 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.665912 kubelet[2009]: W0906 01:24:24.665911 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.666121 kubelet[2009]: E0906 01:24:24.666094 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.666226 kubelet[2009]: E0906 01:24:24.666193 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.666353 kubelet[2009]: W0906 01:24:24.666327 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.666496 kubelet[2009]: E0906 01:24:24.666464 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.667928 kubelet[2009]: E0906 01:24:24.667904 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.668046 kubelet[2009]: W0906 01:24:24.668020 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.668218 kubelet[2009]: E0906 01:24:24.668187 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.668580 kubelet[2009]: E0906 01:24:24.668552 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.668693 kubelet[2009]: W0906 01:24:24.668667 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.668937 kubelet[2009]: E0906 01:24:24.668905 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.670873 kubelet[2009]: E0906 01:24:24.670849 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.671021 kubelet[2009]: W0906 01:24:24.670994 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.671165 kubelet[2009]: E0906 01:24:24.671138 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.672230 env[1201]: time="2025-09-06T01:24:24.672180374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n726l,Uid:be9dddb4-d6e8-416c-b4d0-a24125c6c540,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:24.673074 kubelet[2009]: E0906 01:24:24.673049 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.673074 kubelet[2009]: W0906 01:24:24.673073 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.673338 kubelet[2009]: E0906 01:24:24.673092 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.687895 kubelet[2009]: E0906 01:24:24.687851 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:24.687895 kubelet[2009]: W0906 01:24:24.687884 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:24.688121 kubelet[2009]: E0906 01:24:24.687913 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:24.693513 env[1201]: time="2025-09-06T01:24:24.693351840Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:24.693513 env[1201]: time="2025-09-06T01:24:24.693487327Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:24.693767 env[1201]: time="2025-09-06T01:24:24.693535287Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:24.697240 env[1201]: time="2025-09-06T01:24:24.693866847Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6 pid=2509 runtime=io.containerd.runc.v2 Sep 6 01:24:24.717593 systemd[1]: Started cri-containerd-2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6.scope. Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.799000 audit: BPF prog-id=122 op=LOAD Sep 6 01:24:24.799000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.799000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2509 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633536396538326434383439323430353833346434323962363139 Sep 6 01:24:24.799000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.799000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2509 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633536396538326434383439323430353833346434323962363139 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit: BPF prog-id=123 op=LOAD Sep 6 01:24:24.800000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000329d00 items=0 ppid=2509 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633536396538326434383439323430353833346434323962363139 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit: BPF prog-id=124 op=LOAD Sep 6 01:24:24.800000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000329d48 items=0 ppid=2509 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633536396538326434383439323430353833346434323962363139 Sep 6 01:24:24.800000 audit: BPF prog-id=124 op=UNLOAD Sep 6 01:24:24.800000 audit: BPF prog-id=123 op=UNLOAD Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:24.800000 audit: BPF prog-id=125 op=LOAD Sep 6 01:24:24.800000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000406158 items=0 ppid=2509 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633536396538326434383439323430353833346434323962363139 Sep 6 01:24:24.827063 env[1201]: time="2025-09-06T01:24:24.826987323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n726l,Uid:be9dddb4-d6e8-416c-b4d0-a24125c6c540,Namespace:calico-system,Attempt:0,} returns sandbox id \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\"" Sep 6 01:24:24.838000 audit[2543]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:24.838000 audit[2543]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd3926b950 a2=0 a3=7ffd3926b93c items=0 ppid=2130 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:24.843000 audit[2543]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:24.843000 audit[2543]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd3926b950 a2=0 a3=0 items=0 ppid=2130 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:24.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:25.821443 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3296973919.mount: Deactivated successfully. Sep 6 01:24:26.116829 kubelet[2009]: E0906 01:24:26.116639 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:28.116582 kubelet[2009]: E0906 01:24:28.116491 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:28.545443 env[1201]: time="2025-09-06T01:24:28.545374294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:28.548090 env[1201]: time="2025-09-06T01:24:28.548049718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:28.550008 env[1201]: time="2025-09-06T01:24:28.549964342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:28.559081 env[1201]: time="2025-09-06T01:24:28.559031884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:28.559578 env[1201]: time="2025-09-06T01:24:28.559539163Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 6 01:24:28.563963 env[1201]: time="2025-09-06T01:24:28.563924773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 01:24:28.585485 env[1201]: time="2025-09-06T01:24:28.585435907Z" level=info msg="CreateContainer within sandbox \"d4b08450df1977efd12868729eb3c823aea1208d25a6fd8df834185c47bccf0e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 6 01:24:28.602053 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount818277016.mount: Deactivated successfully. Sep 6 01:24:28.614625 env[1201]: time="2025-09-06T01:24:28.614562167Z" level=info msg="CreateContainer within sandbox \"d4b08450df1977efd12868729eb3c823aea1208d25a6fd8df834185c47bccf0e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a707d454ab6261b24073e622b48aa934155e3ef99e6764f1a9b7ad47e7b90742\"" Sep 6 01:24:28.619199 env[1201]: time="2025-09-06T01:24:28.619124799Z" level=info msg="StartContainer for \"a707d454ab6261b24073e622b48aa934155e3ef99e6764f1a9b7ad47e7b90742\"" Sep 6 01:24:28.659087 systemd[1]: Started cri-containerd-a707d454ab6261b24073e622b48aa934155e3ef99e6764f1a9b7ad47e7b90742.scope. Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.692000 audit: BPF prog-id=126 op=LOAD Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2405 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:28.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303764343534616236323631623234303733653632326234386161 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2405 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:28.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303764343534616236323631623234303733653632326234386161 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit: BPF prog-id=127 op=LOAD Sep 6 01:24:28.693000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025850 items=0 ppid=2405 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:28.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303764343534616236323631623234303733653632326234386161 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit: BPF prog-id=128 op=LOAD Sep 6 01:24:28.693000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025898 items=0 ppid=2405 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:28.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303764343534616236323631623234303733653632326234386161 Sep 6 01:24:28.693000 audit: BPF prog-id=128 op=UNLOAD Sep 6 01:24:28.693000 audit: BPF prog-id=127 op=UNLOAD Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:28.693000 audit: BPF prog-id=129 op=LOAD Sep 6 01:24:28.693000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025ca8 items=0 ppid=2405 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:28.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303764343534616236323631623234303733653632326234386161 Sep 6 01:24:28.741074 env[1201]: time="2025-09-06T01:24:28.740990803Z" level=info msg="StartContainer for \"a707d454ab6261b24073e622b48aa934155e3ef99e6764f1a9b7ad47e7b90742\" returns successfully" Sep 6 01:24:29.263436 kubelet[2009]: E0906 01:24:29.263395 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.263436 kubelet[2009]: W0906 01:24:29.263425 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.264162 kubelet[2009]: E0906 01:24:29.263450 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.264477 kubelet[2009]: E0906 01:24:29.264446 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.264477 kubelet[2009]: W0906 01:24:29.264473 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.264622 kubelet[2009]: E0906 01:24:29.264494 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.264960 kubelet[2009]: E0906 01:24:29.264935 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.264960 kubelet[2009]: W0906 01:24:29.264955 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.265160 kubelet[2009]: E0906 01:24:29.264972 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.265656 kubelet[2009]: E0906 01:24:29.265632 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.265656 kubelet[2009]: W0906 01:24:29.265652 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.265843 kubelet[2009]: E0906 01:24:29.265669 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.266608 kubelet[2009]: E0906 01:24:29.266565 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.266608 kubelet[2009]: W0906 01:24:29.266587 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.266608 kubelet[2009]: E0906 01:24:29.266603 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.268813 kubelet[2009]: E0906 01:24:29.268767 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.268813 kubelet[2009]: W0906 01:24:29.268789 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.268985 kubelet[2009]: E0906 01:24:29.268819 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.269661 kubelet[2009]: E0906 01:24:29.269634 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.269661 kubelet[2009]: W0906 01:24:29.269654 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.269861 kubelet[2009]: E0906 01:24:29.269671 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.270235 kubelet[2009]: E0906 01:24:29.270211 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.270235 kubelet[2009]: W0906 01:24:29.270232 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.270467 kubelet[2009]: E0906 01:24:29.270249 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.270800 kubelet[2009]: E0906 01:24:29.270777 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.270800 kubelet[2009]: W0906 01:24:29.270797 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.270800 kubelet[2009]: E0906 01:24:29.270814 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.272033 kubelet[2009]: E0906 01:24:29.271994 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.272033 kubelet[2009]: W0906 01:24:29.272015 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.272033 kubelet[2009]: E0906 01:24:29.272032 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.272613 kubelet[2009]: E0906 01:24:29.272578 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.272613 kubelet[2009]: W0906 01:24:29.272598 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.272813 kubelet[2009]: E0906 01:24:29.272615 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.273286 kubelet[2009]: E0906 01:24:29.273262 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.273286 kubelet[2009]: W0906 01:24:29.273283 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.273431 kubelet[2009]: E0906 01:24:29.273299 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.274122 kubelet[2009]: E0906 01:24:29.274096 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.274122 kubelet[2009]: W0906 01:24:29.274116 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.274269 kubelet[2009]: E0906 01:24:29.274133 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.274693 kubelet[2009]: E0906 01:24:29.274670 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.274693 kubelet[2009]: W0906 01:24:29.274690 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.274871 kubelet[2009]: E0906 01:24:29.274732 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.275371 kubelet[2009]: E0906 01:24:29.275335 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.275371 kubelet[2009]: W0906 01:24:29.275355 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.275502 kubelet[2009]: E0906 01:24:29.275371 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.283863 kubelet[2009]: I0906 01:24:29.283676 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-857b94cd8b-tj95j" podStartSLOduration=2.099906419 podStartE2EDuration="6.283657407s" podCreationTimestamp="2025-09-06 01:24:23 +0000 UTC" firstStartedPulling="2025-09-06 01:24:24.377305223 +0000 UTC m=+21.539262120" lastFinishedPulling="2025-09-06 01:24:28.561056209 +0000 UTC m=+25.723013108" observedRunningTime="2025-09-06 01:24:29.283292028 +0000 UTC m=+26.445248929" watchObservedRunningTime="2025-09-06 01:24:29.283657407 +0000 UTC m=+26.445614304" Sep 6 01:24:29.292052 kubelet[2009]: E0906 01:24:29.292018 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.292052 kubelet[2009]: W0906 01:24:29.292044 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.292264 kubelet[2009]: E0906 01:24:29.292085 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.292510 kubelet[2009]: E0906 01:24:29.292477 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.292510 kubelet[2009]: W0906 01:24:29.292497 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.292665 kubelet[2009]: E0906 01:24:29.292528 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.292957 kubelet[2009]: E0906 01:24:29.292921 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.292957 kubelet[2009]: W0906 01:24:29.292953 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.293090 kubelet[2009]: E0906 01:24:29.292977 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.293316 kubelet[2009]: E0906 01:24:29.293280 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.293316 kubelet[2009]: W0906 01:24:29.293312 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.293445 kubelet[2009]: E0906 01:24:29.293335 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.293676 kubelet[2009]: E0906 01:24:29.293651 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.293676 kubelet[2009]: W0906 01:24:29.293670 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.293901 kubelet[2009]: E0906 01:24:29.293872 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.294057 kubelet[2009]: E0906 01:24:29.293941 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.294185 kubelet[2009]: W0906 01:24:29.294160 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.294346 kubelet[2009]: E0906 01:24:29.294315 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.295860 kubelet[2009]: E0906 01:24:29.295830 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.295860 kubelet[2009]: W0906 01:24:29.295852 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.296001 kubelet[2009]: E0906 01:24:29.295966 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.296157 kubelet[2009]: E0906 01:24:29.296129 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.296157 kubelet[2009]: W0906 01:24:29.296151 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.296298 kubelet[2009]: E0906 01:24:29.296268 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.296476 kubelet[2009]: E0906 01:24:29.296448 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.296476 kubelet[2009]: W0906 01:24:29.296469 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.296639 kubelet[2009]: E0906 01:24:29.296587 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.296838 kubelet[2009]: E0906 01:24:29.296813 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.296838 kubelet[2009]: W0906 01:24:29.296834 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.296989 kubelet[2009]: E0906 01:24:29.296856 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.297160 kubelet[2009]: E0906 01:24:29.297133 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.297160 kubelet[2009]: W0906 01:24:29.297154 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.297299 kubelet[2009]: E0906 01:24:29.297176 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.297525 kubelet[2009]: E0906 01:24:29.297486 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.297525 kubelet[2009]: W0906 01:24:29.297518 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.297756 kubelet[2009]: E0906 01:24:29.297688 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.298238 kubelet[2009]: E0906 01:24:29.298209 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.298238 kubelet[2009]: W0906 01:24:29.298230 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.298452 kubelet[2009]: E0906 01:24:29.298354 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.309403 kubelet[2009]: E0906 01:24:29.309360 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.309403 kubelet[2009]: W0906 01:24:29.309394 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.309765 kubelet[2009]: E0906 01:24:29.309726 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.309765 kubelet[2009]: W0906 01:24:29.309747 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.309990 kubelet[2009]: E0906 01:24:29.309964 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.309990 kubelet[2009]: W0906 01:24:29.309985 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.310145 kubelet[2009]: E0906 01:24:29.310004 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.310145 kubelet[2009]: E0906 01:24:29.310043 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.310315 kubelet[2009]: E0906 01:24:29.310290 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.310315 kubelet[2009]: W0906 01:24:29.310312 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.310449 kubelet[2009]: E0906 01:24:29.310328 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.310801 kubelet[2009]: E0906 01:24:29.310774 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:29.310801 kubelet[2009]: W0906 01:24:29.310795 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:29.310936 kubelet[2009]: E0906 01:24:29.310811 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.310936 kubelet[2009]: E0906 01:24:29.310834 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:29.335000 audit[2621]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:29.345045 kernel: kauditd_printk_skb: 167 callbacks suppressed Sep 6 01:24:29.345163 kernel: audit: type=1325 audit(1757121869.335:991): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:29.335000 audit[2621]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe446b6db0 a2=0 a3=7ffe446b6d9c items=0 ppid=2130 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:29.357748 kernel: audit: type=1300 audit(1757121869.335:991): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe446b6db0 a2=0 a3=7ffe446b6d9c items=0 ppid=2130 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:29.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:29.358000 audit[2621]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:29.366530 kernel: audit: type=1327 audit(1757121869.335:991): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:29.366647 kernel: audit: type=1325 audit(1757121869.358:992): table=nat:100 family=2 entries=19 op=nft_register_chain pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:29.358000 audit[2621]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe446b6db0 a2=0 a3=7ffe446b6d9c items=0 ppid=2130 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:29.374787 kernel: audit: type=1300 audit(1757121869.358:992): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe446b6db0 a2=0 a3=7ffe446b6d9c items=0 ppid=2130 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:29.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:29.379773 kernel: audit: type=1327 audit(1757121869.358:992): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:30.116752 kubelet[2009]: E0906 01:24:30.116378 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:30.275156 env[1201]: time="2025-09-06T01:24:30.275094239Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:30.278813 env[1201]: time="2025-09-06T01:24:30.278778824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:30.281354 env[1201]: time="2025-09-06T01:24:30.281319135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.282475 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.283905 kubelet[2009]: W0906 01:24:30.282507 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.282536 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.282860 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.283905 kubelet[2009]: W0906 01:24:30.282876 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.282895 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.283156 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.283905 kubelet[2009]: W0906 01:24:30.283170 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.283186 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.283905 kubelet[2009]: E0906 01:24:30.283435 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.284834 kubelet[2009]: W0906 01:24:30.283450 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.284834 kubelet[2009]: E0906 01:24:30.283466 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.284834 kubelet[2009]: E0906 01:24:30.283772 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.284834 kubelet[2009]: W0906 01:24:30.283786 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.284834 kubelet[2009]: E0906 01:24:30.283802 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.285392 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.286434 kubelet[2009]: W0906 01:24:30.285412 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.285429 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.285662 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.286434 kubelet[2009]: W0906 01:24:30.285676 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.285706 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.286011 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.286434 kubelet[2009]: W0906 01:24:30.286025 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.286041 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.286434 kubelet[2009]: E0906 01:24:30.286302 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.287873 env[1201]: time="2025-09-06T01:24:30.285965882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:30.287873 env[1201]: time="2025-09-06T01:24:30.286622072Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 01:24:30.287992 kubelet[2009]: W0906 01:24:30.286316 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.287992 kubelet[2009]: E0906 01:24:30.286332 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.287992 kubelet[2009]: E0906 01:24:30.287027 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.287992 kubelet[2009]: W0906 01:24:30.287040 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.287992 kubelet[2009]: E0906 01:24:30.287055 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.287992 kubelet[2009]: E0906 01:24:30.287540 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.287992 kubelet[2009]: W0906 01:24:30.287555 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.287992 kubelet[2009]: E0906 01:24:30.287571 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.289133 kubelet[2009]: E0906 01:24:30.288668 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.289133 kubelet[2009]: W0906 01:24:30.288699 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.289133 kubelet[2009]: E0906 01:24:30.288753 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.289133 kubelet[2009]: E0906 01:24:30.289001 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.289133 kubelet[2009]: W0906 01:24:30.289014 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.289133 kubelet[2009]: E0906 01:24:30.289033 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.292061 kubelet[2009]: E0906 01:24:30.292036 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.292061 kubelet[2009]: W0906 01:24:30.292057 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.292225 kubelet[2009]: E0906 01:24:30.292085 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.292413 kubelet[2009]: E0906 01:24:30.292388 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.292413 kubelet[2009]: W0906 01:24:30.292411 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.292974 kubelet[2009]: E0906 01:24:30.292428 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.295552 env[1201]: time="2025-09-06T01:24:30.295396149Z" level=info msg="CreateContainer within sandbox \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 01:24:30.300430 kubelet[2009]: E0906 01:24:30.300115 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.300430 kubelet[2009]: W0906 01:24:30.300158 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.300430 kubelet[2009]: E0906 01:24:30.300179 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.301237 kubelet[2009]: E0906 01:24:30.300978 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.301237 kubelet[2009]: W0906 01:24:30.300997 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.301237 kubelet[2009]: E0906 01:24:30.301039 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.301921 kubelet[2009]: E0906 01:24:30.301519 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.301921 kubelet[2009]: W0906 01:24:30.301552 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.301921 kubelet[2009]: E0906 01:24:30.301585 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.302396 kubelet[2009]: E0906 01:24:30.302180 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.302396 kubelet[2009]: W0906 01:24:30.302214 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.302396 kubelet[2009]: E0906 01:24:30.302257 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.303163 kubelet[2009]: E0906 01:24:30.302920 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.303163 kubelet[2009]: W0906 01:24:30.302955 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.303163 kubelet[2009]: E0906 01:24:30.303020 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.303647 kubelet[2009]: E0906 01:24:30.303431 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.303647 kubelet[2009]: W0906 01:24:30.303464 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.303647 kubelet[2009]: E0906 01:24:30.303504 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.304137 kubelet[2009]: E0906 01:24:30.304116 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.304300 kubelet[2009]: W0906 01:24:30.304275 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.304551 kubelet[2009]: E0906 01:24:30.304513 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.305098 kubelet[2009]: E0906 01:24:30.305077 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.305258 kubelet[2009]: W0906 01:24:30.305233 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.305436 kubelet[2009]: E0906 01:24:30.305399 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.306084 kubelet[2009]: E0906 01:24:30.306062 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.306319 kubelet[2009]: W0906 01:24:30.306294 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.306504 kubelet[2009]: E0906 01:24:30.306473 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.306908 kubelet[2009]: E0906 01:24:30.306886 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.307048 kubelet[2009]: W0906 01:24:30.307023 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.307217 kubelet[2009]: E0906 01:24:30.307185 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.307617 kubelet[2009]: E0906 01:24:30.307595 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.311264 kubelet[2009]: W0906 01:24:30.311237 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.315745 kubelet[2009]: E0906 01:24:30.311772 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.315522 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2171684225.mount: Deactivated successfully. Sep 6 01:24:30.317238 kubelet[2009]: E0906 01:24:30.317216 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.317426 kubelet[2009]: W0906 01:24:30.317401 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.317654 kubelet[2009]: E0906 01:24:30.317621 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.318137 kubelet[2009]: E0906 01:24:30.318107 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.318287 kubelet[2009]: W0906 01:24:30.318250 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.318496 kubelet[2009]: E0906 01:24:30.318459 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.319237 kubelet[2009]: E0906 01:24:30.319205 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.319480 kubelet[2009]: W0906 01:24:30.319318 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.319480 kubelet[2009]: E0906 01:24:30.319369 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.320416 kubelet[2009]: E0906 01:24:30.320394 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.320557 kubelet[2009]: W0906 01:24:30.320531 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.320787 kubelet[2009]: E0906 01:24:30.320756 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.321235 kubelet[2009]: E0906 01:24:30.321182 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.321411 kubelet[2009]: W0906 01:24:30.321385 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.321587 kubelet[2009]: E0906 01:24:30.321547 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.322071 kubelet[2009]: E0906 01:24:30.322038 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.322244 kubelet[2009]: W0906 01:24:30.322219 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.322463 kubelet[2009]: E0906 01:24:30.322424 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.323039 kubelet[2009]: E0906 01:24:30.323017 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:24:30.323280 kubelet[2009]: W0906 01:24:30.323255 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:24:30.323482 kubelet[2009]: E0906 01:24:30.323455 2009 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:24:30.323568 env[1201]: time="2025-09-06T01:24:30.323452428Z" level=info msg="CreateContainer within sandbox \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c\"" Sep 6 01:24:30.325784 env[1201]: time="2025-09-06T01:24:30.324897069Z" level=info msg="StartContainer for \"614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c\"" Sep 6 01:24:30.362906 systemd[1]: Started cri-containerd-614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c.scope. Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.418821 kernel: audit: type=1400 audit(1757121870.406:993): avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f862ae088d8 items=0 ppid=2509 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:30.429908 kernel: audit: type=1300 audit(1757121870.406:993): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f862ae088d8 items=0 ppid=2509 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:30.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346532383831633235393330383562353936333861623064636166 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.442329 kernel: audit: type=1327 audit(1757121870.406:993): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346532383831633235393330383562353936333861623064636166 Sep 6 01:24:30.442462 kernel: audit: type=1400 audit(1757121870.406:994): avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.406000 audit: BPF prog-id=130 op=LOAD Sep 6 01:24:30.406000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000392fd8 items=0 ppid=2509 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:30.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346532383831633235393330383562353936333861623064636166 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit: BPF prog-id=131 op=LOAD Sep 6 01:24:30.417000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000393028 items=0 ppid=2509 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:30.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346532383831633235393330383562353936333861623064636166 Sep 6 01:24:30.417000 audit: BPF prog-id=131 op=UNLOAD Sep 6 01:24:30.417000 audit: BPF prog-id=130 op=UNLOAD Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:30.417000 audit: BPF prog-id=132 op=LOAD Sep 6 01:24:30.417000 audit[2663]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003930b8 items=0 ppid=2509 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:30.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346532383831633235393330383562353936333861623064636166 Sep 6 01:24:30.460852 env[1201]: time="2025-09-06T01:24:30.460787540Z" level=info msg="StartContainer for \"614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c\" returns successfully" Sep 6 01:24:30.478488 systemd[1]: cri-containerd-614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c.scope: Deactivated successfully. Sep 6 01:24:30.481000 audit: BPF prog-id=132 op=UNLOAD Sep 6 01:24:30.569862 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c-rootfs.mount: Deactivated successfully. Sep 6 01:24:30.653868 env[1201]: time="2025-09-06T01:24:30.653797135Z" level=info msg="shim disconnected" id=614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c Sep 6 01:24:30.654165 env[1201]: time="2025-09-06T01:24:30.654110944Z" level=warning msg="cleaning up after shim disconnected" id=614e2881c2593085b59638ab0dcaf3611274fcaa1d4c0b53a98ae45c1ab6b79c namespace=k8s.io Sep 6 01:24:30.654386 env[1201]: time="2025-09-06T01:24:30.654280658Z" level=info msg="cleaning up dead shim" Sep 6 01:24:30.670895 env[1201]: time="2025-09-06T01:24:30.670828943Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:24:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2705 runtime=io.containerd.runc.v2\n" Sep 6 01:24:31.269706 env[1201]: time="2025-09-06T01:24:31.269357368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 01:24:32.116382 kubelet[2009]: E0906 01:24:32.116287 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:34.116075 kubelet[2009]: E0906 01:24:34.115995 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:36.115987 kubelet[2009]: E0906 01:24:36.115577 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:36.729937 env[1201]: time="2025-09-06T01:24:36.729867285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:36.732263 env[1201]: time="2025-09-06T01:24:36.732217833Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:36.734543 env[1201]: time="2025-09-06T01:24:36.734470151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:36.736649 env[1201]: time="2025-09-06T01:24:36.736609420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:36.737638 env[1201]: time="2025-09-06T01:24:36.737595776Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 01:24:36.745750 env[1201]: time="2025-09-06T01:24:36.745671500Z" level=info msg="CreateContainer within sandbox \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 01:24:36.769220 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2205485789.mount: Deactivated successfully. Sep 6 01:24:36.774492 env[1201]: time="2025-09-06T01:24:36.774385154Z" level=info msg="CreateContainer within sandbox \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523\"" Sep 6 01:24:36.777198 env[1201]: time="2025-09-06T01:24:36.777136691Z" level=info msg="StartContainer for \"03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523\"" Sep 6 01:24:36.826796 systemd[1]: Started cri-containerd-03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523.scope. Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.879973 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 6 01:24:36.880082 kernel: audit: type=1400 audit(1757121876.867:1000): avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f21927aced8 items=0 ppid=2509 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:36.902634 kernel: audit: type=1300 audit(1757121876.867:1000): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f21927aced8 items=0 ppid=2509 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:36.902889 kernel: audit: type=1327 audit(1757121876.867:1000): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033303337616136396631386563303765643033383035656132323961 Sep 6 01:24:36.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033303337616136396631386563303765643033383035656132323961 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.914757 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.923754 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.932766 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.932928 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.952212 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.959828 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit: BPF prog-id=133 op=LOAD Sep 6 01:24:36.867000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00026d368 items=0 ppid=2509 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:36.968882 kernel: audit: type=1400 audit(1757121876.867:1001): avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033303337616136396631386563303765643033383035656132323961 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.883000 audit: BPF prog-id=134 op=LOAD Sep 6 01:24:36.883000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00026d3b8 items=0 ppid=2509 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:36.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033303337616136396631386563303765643033383035656132323961 Sep 6 01:24:36.883000 audit: BPF prog-id=134 op=UNLOAD Sep 6 01:24:36.884000 audit: BPF prog-id=133 op=UNLOAD Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { perfmon } for pid=2729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit[2729]: AVC avc: denied { bpf } for pid=2729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:36.884000 audit: BPF prog-id=135 op=LOAD Sep 6 01:24:36.884000 audit[2729]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00026d448 items=0 ppid=2509 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:36.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033303337616136396631386563303765643033383035656132323961 Sep 6 01:24:36.996298 env[1201]: time="2025-09-06T01:24:36.996184266Z" level=info msg="StartContainer for \"03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523\" returns successfully" Sep 6 01:24:37.761502 systemd[1]: run-containerd-runc-k8s.io-03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523-runc.pjXWTg.mount: Deactivated successfully. Sep 6 01:24:38.116090 kubelet[2009]: E0906 01:24:38.115880 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:38.188347 env[1201]: time="2025-09-06T01:24:38.188215781Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:24:38.193442 systemd[1]: cri-containerd-03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523.scope: Deactivated successfully. Sep 6 01:24:38.195000 audit: BPF prog-id=135 op=UNLOAD Sep 6 01:24:38.221103 kubelet[2009]: I0906 01:24:38.219864 2009 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Sep 6 01:24:38.259676 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523-rootfs.mount: Deactivated successfully. Sep 6 01:24:38.264869 env[1201]: time="2025-09-06T01:24:38.264779766Z" level=info msg="shim disconnected" id=03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523 Sep 6 01:24:38.265382 env[1201]: time="2025-09-06T01:24:38.265338518Z" level=warning msg="cleaning up after shim disconnected" id=03037aa69f18ec07ed03805ea229a2f31a37ecea0e13c3b3c62b06ca9ae86523 namespace=k8s.io Sep 6 01:24:38.265546 env[1201]: time="2025-09-06T01:24:38.265516921Z" level=info msg="cleaning up dead shim" Sep 6 01:24:38.283360 env[1201]: time="2025-09-06T01:24:38.283254064Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:24:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2771 runtime=io.containerd.runc.v2\n" Sep 6 01:24:38.293450 env[1201]: time="2025-09-06T01:24:38.293410805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 01:24:38.316061 systemd[1]: Created slice kubepods-burstable-pod47db2387_c90d_4f84_b7fe_e2c1c0ca0443.slice. Sep 6 01:24:38.318500 kubelet[2009]: W0906 01:24:38.318435 2009 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:srv-bf5vc.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'srv-bf5vc.gb1.brightbox.com' and this object Sep 6 01:24:38.318801 kubelet[2009]: E0906 01:24:38.318763 2009 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:srv-bf5vc.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'srv-bf5vc.gb1.brightbox.com' and this object" logger="UnhandledError" Sep 6 01:24:38.325640 kubelet[2009]: W0906 01:24:38.325589 2009 reflector.go:561] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:srv-bf5vc.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'srv-bf5vc.gb1.brightbox.com' and this object Sep 6 01:24:38.325816 kubelet[2009]: E0906 01:24:38.325663 2009 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"calico-apiserver-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"calico-apiserver-certs\" is forbidden: User \"system:node:srv-bf5vc.gb1.brightbox.com\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'srv-bf5vc.gb1.brightbox.com' and this object" logger="UnhandledError" Sep 6 01:24:38.326626 kubelet[2009]: W0906 01:24:38.326599 2009 reflector.go:561] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-bf5vc.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'srv-bf5vc.gb1.brightbox.com' and this object Sep 6 01:24:38.326789 kubelet[2009]: E0906 01:24:38.326756 2009 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-bf5vc.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'srv-bf5vc.gb1.brightbox.com' and this object" logger="UnhandledError" Sep 6 01:24:38.327780 systemd[1]: Created slice kubepods-besteffort-pod422459a7_59fd_4062_8887_0e32646e6d6b.slice. Sep 6 01:24:38.338516 systemd[1]: Created slice kubepods-besteffort-pod68446d0a_14e3_4523_a08c_0c70cebecb91.slice. Sep 6 01:24:38.378355 systemd[1]: Created slice kubepods-besteffort-poda8875be0_eb58_442a_b36c_f99a81a461bf.slice. Sep 6 01:24:38.414862 systemd[1]: Created slice kubepods-besteffort-pod5edf1e57_2883_47ef_ba53_454041fc8724.slice. Sep 6 01:24:38.429203 systemd[1]: Created slice kubepods-besteffort-pod73a31356_b575_4210_9fd8_adaaab10c463.slice. Sep 6 01:24:38.436038 systemd[1]: Created slice kubepods-burstable-podb425bfaf_5f54_4b5c_88f3_3e0319345d4a.slice. Sep 6 01:24:38.467696 kubelet[2009]: I0906 01:24:38.467613 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73a31356-b575-4210-9fd8-adaaab10c463-whisker-ca-bundle\") pod \"whisker-7fdd886675-5k587\" (UID: \"73a31356-b575-4210-9fd8-adaaab10c463\") " pod="calico-system/whisker-7fdd886675-5k587" Sep 6 01:24:38.468094 kubelet[2009]: I0906 01:24:38.467733 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7bf22\" (UniqueName: \"kubernetes.io/projected/73a31356-b575-4210-9fd8-adaaab10c463-kube-api-access-7bf22\") pod \"whisker-7fdd886675-5k587\" (UID: \"73a31356-b575-4210-9fd8-adaaab10c463\") " pod="calico-system/whisker-7fdd886675-5k587" Sep 6 01:24:38.468094 kubelet[2009]: I0906 01:24:38.467843 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9vhd\" (UniqueName: \"kubernetes.io/projected/422459a7-59fd-4062-8887-0e32646e6d6b-kube-api-access-v9vhd\") pod \"calico-apiserver-7b796d556f-tb2gx\" (UID: \"422459a7-59fd-4062-8887-0e32646e6d6b\") " pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" Sep 6 01:24:38.468094 kubelet[2009]: I0906 01:24:38.467912 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/5edf1e57-2883-47ef-ba53-454041fc8724-config\") pod \"goldmane-7988f88666-wwmbx\" (UID: \"5edf1e57-2883-47ef-ba53-454041fc8724\") " pod="calico-system/goldmane-7988f88666-wwmbx" Sep 6 01:24:38.468094 kubelet[2009]: I0906 01:24:38.468001 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b425bfaf-5f54-4b5c-88f3-3e0319345d4a-config-volume\") pod \"coredns-7c65d6cfc9-bbd56\" (UID: \"b425bfaf-5f54-4b5c-88f3-3e0319345d4a\") " pod="kube-system/coredns-7c65d6cfc9-bbd56" Sep 6 01:24:38.468094 kubelet[2009]: I0906 01:24:38.468087 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mcjjf\" (UniqueName: \"kubernetes.io/projected/47db2387-c90d-4f84-b7fe-e2c1c0ca0443-kube-api-access-mcjjf\") pod \"coredns-7c65d6cfc9-p8px4\" (UID: \"47db2387-c90d-4f84-b7fe-e2c1c0ca0443\") " pod="kube-system/coredns-7c65d6cfc9-p8px4" Sep 6 01:24:38.468420 kubelet[2009]: I0906 01:24:38.468120 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/5edf1e57-2883-47ef-ba53-454041fc8724-goldmane-key-pair\") pod \"goldmane-7988f88666-wwmbx\" (UID: \"5edf1e57-2883-47ef-ba53-454041fc8724\") " pod="calico-system/goldmane-7988f88666-wwmbx" Sep 6 01:24:38.468420 kubelet[2009]: I0906 01:24:38.468171 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pr88j\" (UniqueName: \"kubernetes.io/projected/5edf1e57-2883-47ef-ba53-454041fc8724-kube-api-access-pr88j\") pod \"goldmane-7988f88666-wwmbx\" (UID: \"5edf1e57-2883-47ef-ba53-454041fc8724\") " pod="calico-system/goldmane-7988f88666-wwmbx" Sep 6 01:24:38.468420 kubelet[2009]: I0906 01:24:38.468207 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkkjl\" (UniqueName: \"kubernetes.io/projected/68446d0a-14e3-4523-a08c-0c70cebecb91-kube-api-access-lkkjl\") pod \"calico-kube-controllers-b66569c6-zkbvb\" (UID: \"68446d0a-14e3-4523-a08c-0c70cebecb91\") " pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" Sep 6 01:24:38.468420 kubelet[2009]: I0906 01:24:38.468275 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8875be0-eb58-442a-b36c-f99a81a461bf-calico-apiserver-certs\") pod \"calico-apiserver-7b796d556f-ksp96\" (UID: \"a8875be0-eb58-442a-b36c-f99a81a461bf\") " pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" Sep 6 01:24:38.468420 kubelet[2009]: I0906 01:24:38.468368 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/68446d0a-14e3-4523-a08c-0c70cebecb91-tigera-ca-bundle\") pod \"calico-kube-controllers-b66569c6-zkbvb\" (UID: \"68446d0a-14e3-4523-a08c-0c70cebecb91\") " pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" Sep 6 01:24:38.468750 kubelet[2009]: I0906 01:24:38.468432 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c52pj\" (UniqueName: \"kubernetes.io/projected/a8875be0-eb58-442a-b36c-f99a81a461bf-kube-api-access-c52pj\") pod \"calico-apiserver-7b796d556f-ksp96\" (UID: \"a8875be0-eb58-442a-b36c-f99a81a461bf\") " pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" Sep 6 01:24:38.468750 kubelet[2009]: I0906 01:24:38.468508 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5edf1e57-2883-47ef-ba53-454041fc8724-goldmane-ca-bundle\") pod \"goldmane-7988f88666-wwmbx\" (UID: \"5edf1e57-2883-47ef-ba53-454041fc8724\") " pod="calico-system/goldmane-7988f88666-wwmbx" Sep 6 01:24:38.468750 kubelet[2009]: I0906 01:24:38.468603 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/73a31356-b575-4210-9fd8-adaaab10c463-whisker-backend-key-pair\") pod \"whisker-7fdd886675-5k587\" (UID: \"73a31356-b575-4210-9fd8-adaaab10c463\") " pod="calico-system/whisker-7fdd886675-5k587" Sep 6 01:24:38.468750 kubelet[2009]: I0906 01:24:38.468687 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z4682\" (UniqueName: \"kubernetes.io/projected/b425bfaf-5f54-4b5c-88f3-3e0319345d4a-kube-api-access-z4682\") pod \"coredns-7c65d6cfc9-bbd56\" (UID: \"b425bfaf-5f54-4b5c-88f3-3e0319345d4a\") " pod="kube-system/coredns-7c65d6cfc9-bbd56" Sep 6 01:24:38.468993 kubelet[2009]: I0906 01:24:38.468756 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/47db2387-c90d-4f84-b7fe-e2c1c0ca0443-config-volume\") pod \"coredns-7c65d6cfc9-p8px4\" (UID: \"47db2387-c90d-4f84-b7fe-e2c1c0ca0443\") " pod="kube-system/coredns-7c65d6cfc9-p8px4" Sep 6 01:24:38.468993 kubelet[2009]: I0906 01:24:38.468827 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/422459a7-59fd-4062-8887-0e32646e6d6b-calico-apiserver-certs\") pod \"calico-apiserver-7b796d556f-tb2gx\" (UID: \"422459a7-59fd-4062-8887-0e32646e6d6b\") " pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" Sep 6 01:24:38.647626 env[1201]: time="2025-09-06T01:24:38.646480703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b66569c6-zkbvb,Uid:68446d0a-14e3-4523-a08c-0c70cebecb91,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:38.724602 env[1201]: time="2025-09-06T01:24:38.724491546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-wwmbx,Uid:5edf1e57-2883-47ef-ba53-454041fc8724,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:38.735668 env[1201]: time="2025-09-06T01:24:38.735588986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7fdd886675-5k587,Uid:73a31356-b575-4210-9fd8-adaaab10c463,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:38.933208 env[1201]: time="2025-09-06T01:24:38.929530890Z" level=error msg="Failed to destroy network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.933126 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d-shm.mount: Deactivated successfully. Sep 6 01:24:38.935099 env[1201]: time="2025-09-06T01:24:38.935035477Z" level=error msg="encountered an error cleaning up failed sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.935419 env[1201]: time="2025-09-06T01:24:38.935150507Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-wwmbx,Uid:5edf1e57-2883-47ef-ba53-454041fc8724,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.935776 kubelet[2009]: E0906 01:24:38.935654 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.935957 kubelet[2009]: E0906 01:24:38.935901 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-7988f88666-wwmbx" Sep 6 01:24:38.936025 kubelet[2009]: E0906 01:24:38.935956 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-7988f88666-wwmbx" Sep 6 01:24:38.936145 kubelet[2009]: E0906 01:24:38.936083 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-7988f88666-wwmbx_calico-system(5edf1e57-2883-47ef-ba53-454041fc8724)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-7988f88666-wwmbx_calico-system(5edf1e57-2883-47ef-ba53-454041fc8724)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-7988f88666-wwmbx" podUID="5edf1e57-2883-47ef-ba53-454041fc8724" Sep 6 01:24:38.953761 env[1201]: time="2025-09-06T01:24:38.953576398Z" level=error msg="Failed to destroy network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.957256 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09-shm.mount: Deactivated successfully. Sep 6 01:24:38.958933 env[1201]: time="2025-09-06T01:24:38.958886636Z" level=error msg="encountered an error cleaning up failed sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.959168 env[1201]: time="2025-09-06T01:24:38.959101931Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b66569c6-zkbvb,Uid:68446d0a-14e3-4523-a08c-0c70cebecb91,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.959905 kubelet[2009]: E0906 01:24:38.959682 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.960010 kubelet[2009]: E0906 01:24:38.959984 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" Sep 6 01:24:38.960082 kubelet[2009]: E0906 01:24:38.960025 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" Sep 6 01:24:38.962551 env[1201]: time="2025-09-06T01:24:38.962508104Z" level=error msg="Failed to destroy network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.965761 env[1201]: time="2025-09-06T01:24:38.965665554Z" level=error msg="encountered an error cleaning up failed sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.965862 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26-shm.mount: Deactivated successfully. Sep 6 01:24:38.966440 env[1201]: time="2025-09-06T01:24:38.966378498Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7fdd886675-5k587,Uid:73a31356-b575-4210-9fd8-adaaab10c463,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.967348 kubelet[2009]: E0906 01:24:38.960195 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-b66569c6-zkbvb_calico-system(68446d0a-14e3-4523-a08c-0c70cebecb91)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-b66569c6-zkbvb_calico-system(68446d0a-14e3-4523-a08c-0c70cebecb91)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" podUID="68446d0a-14e3-4523-a08c-0c70cebecb91" Sep 6 01:24:38.967994 kubelet[2009]: E0906 01:24:38.967929 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:38.968083 kubelet[2009]: E0906 01:24:38.968004 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7fdd886675-5k587" Sep 6 01:24:38.968083 kubelet[2009]: E0906 01:24:38.968032 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7fdd886675-5k587" Sep 6 01:24:38.968238 kubelet[2009]: E0906 01:24:38.968075 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-7fdd886675-5k587_calico-system(73a31356-b575-4210-9fd8-adaaab10c463)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-7fdd886675-5k587_calico-system(73a31356-b575-4210-9fd8-adaaab10c463)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7fdd886675-5k587" podUID="73a31356-b575-4210-9fd8-adaaab10c463" Sep 6 01:24:39.296145 kubelet[2009]: I0906 01:24:39.296083 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:24:39.302170 kubelet[2009]: I0906 01:24:39.302139 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:24:39.306051 env[1201]: time="2025-09-06T01:24:39.305994757Z" level=info msg="StopPodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\"" Sep 6 01:24:39.307254 env[1201]: time="2025-09-06T01:24:39.306182390Z" level=info msg="StopPodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\"" Sep 6 01:24:39.310145 kubelet[2009]: I0906 01:24:39.310113 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:24:39.314041 env[1201]: time="2025-09-06T01:24:39.313953063Z" level=info msg="StopPodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\"" Sep 6 01:24:39.402743 env[1201]: time="2025-09-06T01:24:39.402612972Z" level=error msg="StopPodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" failed" error="failed to destroy network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.403443 kubelet[2009]: E0906 01:24:39.403182 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:24:39.406288 kubelet[2009]: E0906 01:24:39.403281 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d"} Sep 6 01:24:39.406288 kubelet[2009]: E0906 01:24:39.406158 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5edf1e57-2883-47ef-ba53-454041fc8724\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:39.406288 kubelet[2009]: E0906 01:24:39.406210 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5edf1e57-2883-47ef-ba53-454041fc8724\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-7988f88666-wwmbx" podUID="5edf1e57-2883-47ef-ba53-454041fc8724" Sep 6 01:24:39.408139 env[1201]: time="2025-09-06T01:24:39.408061415Z" level=error msg="StopPodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" failed" error="failed to destroy network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.408582 kubelet[2009]: E0906 01:24:39.408358 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:24:39.408582 kubelet[2009]: E0906 01:24:39.408422 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26"} Sep 6 01:24:39.408582 kubelet[2009]: E0906 01:24:39.408471 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"73a31356-b575-4210-9fd8-adaaab10c463\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:39.408582 kubelet[2009]: E0906 01:24:39.408532 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"73a31356-b575-4210-9fd8-adaaab10c463\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7fdd886675-5k587" podUID="73a31356-b575-4210-9fd8-adaaab10c463" Sep 6 01:24:39.412048 env[1201]: time="2025-09-06T01:24:39.411981690Z" level=error msg="StopPodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" failed" error="failed to destroy network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.412479 kubelet[2009]: E0906 01:24:39.412270 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:24:39.412479 kubelet[2009]: E0906 01:24:39.412316 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09"} Sep 6 01:24:39.412479 kubelet[2009]: E0906 01:24:39.412354 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68446d0a-14e3-4523-a08c-0c70cebecb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:39.412479 kubelet[2009]: E0906 01:24:39.412398 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68446d0a-14e3-4523-a08c-0c70cebecb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" podUID="68446d0a-14e3-4523-a08c-0c70cebecb91" Sep 6 01:24:39.572857 kubelet[2009]: E0906 01:24:39.570971 2009 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Sep 6 01:24:39.573307 kubelet[2009]: E0906 01:24:39.573278 2009 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/47db2387-c90d-4f84-b7fe-e2c1c0ca0443-config-volume podName:47db2387-c90d-4f84-b7fe-e2c1c0ca0443 nodeName:}" failed. No retries permitted until 2025-09-06 01:24:40.073216042 +0000 UTC m=+37.235172935 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/47db2387-c90d-4f84-b7fe-e2c1c0ca0443-config-volume") pod "coredns-7c65d6cfc9-p8px4" (UID: "47db2387-c90d-4f84-b7fe-e2c1c0ca0443") : failed to sync configmap cache: timed out waiting for the condition Sep 6 01:24:39.612563 env[1201]: time="2025-09-06T01:24:39.612469329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-ksp96,Uid:a8875be0-eb58-442a-b36c-f99a81a461bf,Namespace:calico-apiserver,Attempt:0,}" Sep 6 01:24:39.642939 env[1201]: time="2025-09-06T01:24:39.642866571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-bbd56,Uid:b425bfaf-5f54-4b5c-88f3-3e0319345d4a,Namespace:kube-system,Attempt:0,}" Sep 6 01:24:39.719535 env[1201]: time="2025-09-06T01:24:39.719394485Z" level=error msg="Failed to destroy network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.720371 env[1201]: time="2025-09-06T01:24:39.720304618Z" level=error msg="encountered an error cleaning up failed sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.720590 env[1201]: time="2025-09-06T01:24:39.720548438Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-ksp96,Uid:a8875be0-eb58-442a-b36c-f99a81a461bf,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.721191 kubelet[2009]: E0906 01:24:39.721122 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.721310 kubelet[2009]: E0906 01:24:39.721232 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" Sep 6 01:24:39.721310 kubelet[2009]: E0906 01:24:39.721266 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" Sep 6 01:24:39.721433 kubelet[2009]: E0906 01:24:39.721377 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7b796d556f-ksp96_calico-apiserver(a8875be0-eb58-442a-b36c-f99a81a461bf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7b796d556f-ksp96_calico-apiserver(a8875be0-eb58-442a-b36c-f99a81a461bf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" podUID="a8875be0-eb58-442a-b36c-f99a81a461bf" Sep 6 01:24:39.754420 env[1201]: time="2025-09-06T01:24:39.754314589Z" level=error msg="Failed to destroy network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.755183 env[1201]: time="2025-09-06T01:24:39.755073231Z" level=error msg="encountered an error cleaning up failed sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.755282 env[1201]: time="2025-09-06T01:24:39.755199512Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-bbd56,Uid:b425bfaf-5f54-4b5c-88f3-3e0319345d4a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.755731 kubelet[2009]: E0906 01:24:39.755645 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.755901 kubelet[2009]: E0906 01:24:39.755844 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-bbd56" Sep 6 01:24:39.755984 kubelet[2009]: E0906 01:24:39.755907 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-bbd56" Sep 6 01:24:39.756048 kubelet[2009]: E0906 01:24:39.755998 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-bbd56_kube-system(b425bfaf-5f54-4b5c-88f3-3e0319345d4a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-bbd56_kube-system(b425bfaf-5f54-4b5c-88f3-3e0319345d4a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-bbd56" podUID="b425bfaf-5f54-4b5c-88f3-3e0319345d4a" Sep 6 01:24:39.837889 env[1201]: time="2025-09-06T01:24:39.835653907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-tb2gx,Uid:422459a7-59fd-4062-8887-0e32646e6d6b,Namespace:calico-apiserver,Attempt:0,}" Sep 6 01:24:39.988542 env[1201]: time="2025-09-06T01:24:39.988428852Z" level=error msg="Failed to destroy network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.992111 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa-shm.mount: Deactivated successfully. Sep 6 01:24:39.994094 env[1201]: time="2025-09-06T01:24:39.994041756Z" level=error msg="encountered an error cleaning up failed sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.994353 env[1201]: time="2025-09-06T01:24:39.994264348Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-tb2gx,Uid:422459a7-59fd-4062-8887-0e32646e6d6b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.995086 kubelet[2009]: E0906 01:24:39.994998 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:39.995359 kubelet[2009]: E0906 01:24:39.995099 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" Sep 6 01:24:39.995359 kubelet[2009]: E0906 01:24:39.995172 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" Sep 6 01:24:39.995837 kubelet[2009]: E0906 01:24:39.995416 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7b796d556f-tb2gx_calico-apiserver(422459a7-59fd-4062-8887-0e32646e6d6b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7b796d556f-tb2gx_calico-apiserver(422459a7-59fd-4062-8887-0e32646e6d6b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" podUID="422459a7-59fd-4062-8887-0e32646e6d6b" Sep 6 01:24:40.124925 systemd[1]: Created slice kubepods-besteffort-pod2508492e_0028_4e46_b00a_9f1d7bcf3f9b.slice. Sep 6 01:24:40.129209 env[1201]: time="2025-09-06T01:24:40.129148176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-p8px4,Uid:47db2387-c90d-4f84-b7fe-e2c1c0ca0443,Namespace:kube-system,Attempt:0,}" Sep 6 01:24:40.130886 env[1201]: time="2025-09-06T01:24:40.130828990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4kjd,Uid:2508492e-0028-4e46-b00a-9f1d7bcf3f9b,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:40.296569 env[1201]: time="2025-09-06T01:24:40.296488350Z" level=error msg="Failed to destroy network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.297142 env[1201]: time="2025-09-06T01:24:40.297064306Z" level=error msg="encountered an error cleaning up failed sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.297232 env[1201]: time="2025-09-06T01:24:40.297146380Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-p8px4,Uid:47db2387-c90d-4f84-b7fe-e2c1c0ca0443,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.298771 kubelet[2009]: E0906 01:24:40.297546 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.298771 kubelet[2009]: E0906 01:24:40.297647 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-p8px4" Sep 6 01:24:40.298771 kubelet[2009]: E0906 01:24:40.297679 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-p8px4" Sep 6 01:24:40.299501 kubelet[2009]: E0906 01:24:40.297872 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-p8px4_kube-system(47db2387-c90d-4f84-b7fe-e2c1c0ca0443)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-p8px4_kube-system(47db2387-c90d-4f84-b7fe-e2c1c0ca0443)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-p8px4" podUID="47db2387-c90d-4f84-b7fe-e2c1c0ca0443" Sep 6 01:24:40.325420 kubelet[2009]: I0906 01:24:40.325335 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:24:40.332075 env[1201]: time="2025-09-06T01:24:40.331991494Z" level=error msg="Failed to destroy network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.332569 env[1201]: time="2025-09-06T01:24:40.332471906Z" level=error msg="encountered an error cleaning up failed sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.332639 env[1201]: time="2025-09-06T01:24:40.332542781Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4kjd,Uid:2508492e-0028-4e46-b00a-9f1d7bcf3f9b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.332922 env[1201]: time="2025-09-06T01:24:40.332886065Z" level=info msg="StopPodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\"" Sep 6 01:24:40.337550 kubelet[2009]: E0906 01:24:40.337484 2009 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.337650 kubelet[2009]: E0906 01:24:40.337607 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:40.337719 kubelet[2009]: E0906 01:24:40.337673 2009 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f4kjd" Sep 6 01:24:40.337880 kubelet[2009]: E0906 01:24:40.337793 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-f4kjd_calico-system(2508492e-0028-4e46-b00a-9f1d7bcf3f9b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-f4kjd_calico-system(2508492e-0028-4e46-b00a-9f1d7bcf3f9b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:40.343941 kubelet[2009]: I0906 01:24:40.342605 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:24:40.345136 env[1201]: time="2025-09-06T01:24:40.345082411Z" level=info msg="StopPodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\"" Sep 6 01:24:40.354336 kubelet[2009]: I0906 01:24:40.354295 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:24:40.357078 env[1201]: time="2025-09-06T01:24:40.357031362Z" level=info msg="StopPodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\"" Sep 6 01:24:40.360733 kubelet[2009]: I0906 01:24:40.360680 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:24:40.363072 env[1201]: time="2025-09-06T01:24:40.363027237Z" level=info msg="StopPodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\"" Sep 6 01:24:40.446461 env[1201]: time="2025-09-06T01:24:40.446386582Z" level=error msg="StopPodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" failed" error="failed to destroy network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.447112 kubelet[2009]: E0906 01:24:40.447037 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:24:40.447224 kubelet[2009]: E0906 01:24:40.447132 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11"} Sep 6 01:24:40.447356 kubelet[2009]: E0906 01:24:40.447271 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b425bfaf-5f54-4b5c-88f3-3e0319345d4a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:40.447828 kubelet[2009]: E0906 01:24:40.447405 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b425bfaf-5f54-4b5c-88f3-3e0319345d4a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-bbd56" podUID="b425bfaf-5f54-4b5c-88f3-3e0319345d4a" Sep 6 01:24:40.497102 env[1201]: time="2025-09-06T01:24:40.496991500Z" level=error msg="StopPodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" failed" error="failed to destroy network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.497548 kubelet[2009]: E0906 01:24:40.497496 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:24:40.497672 kubelet[2009]: E0906 01:24:40.497619 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa"} Sep 6 01:24:40.497766 kubelet[2009]: E0906 01:24:40.497690 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"422459a7-59fd-4062-8887-0e32646e6d6b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:40.497885 kubelet[2009]: E0906 01:24:40.497766 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"422459a7-59fd-4062-8887-0e32646e6d6b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" podUID="422459a7-59fd-4062-8887-0e32646e6d6b" Sep 6 01:24:40.514203 env[1201]: time="2025-09-06T01:24:40.514092896Z" level=error msg="StopPodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" failed" error="failed to destroy network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.515103 kubelet[2009]: E0906 01:24:40.514498 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:24:40.517593 kubelet[2009]: E0906 01:24:40.517517 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531"} Sep 6 01:24:40.517982 kubelet[2009]: E0906 01:24:40.517823 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47db2387-c90d-4f84-b7fe-e2c1c0ca0443\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:40.518251 kubelet[2009]: E0906 01:24:40.517943 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47db2387-c90d-4f84-b7fe-e2c1c0ca0443\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-p8px4" podUID="47db2387-c90d-4f84-b7fe-e2c1c0ca0443" Sep 6 01:24:40.529621 env[1201]: time="2025-09-06T01:24:40.529547232Z" level=error msg="StopPodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" failed" error="failed to destroy network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:40.532842 kubelet[2009]: E0906 01:24:40.532674 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:24:40.532987 kubelet[2009]: E0906 01:24:40.532872 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd"} Sep 6 01:24:40.532987 kubelet[2009]: E0906 01:24:40.532935 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8875be0-eb58-442a-b36c-f99a81a461bf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:40.533152 kubelet[2009]: E0906 01:24:40.532970 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8875be0-eb58-442a-b36c-f99a81a461bf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" podUID="a8875be0-eb58-442a-b36c-f99a81a461bf" Sep 6 01:24:40.763040 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531-shm.mount: Deactivated successfully. Sep 6 01:24:41.371941 kubelet[2009]: I0906 01:24:41.369487 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:24:41.373094 env[1201]: time="2025-09-06T01:24:41.372987805Z" level=info msg="StopPodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\"" Sep 6 01:24:41.440176 env[1201]: time="2025-09-06T01:24:41.440100964Z" level=error msg="StopPodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" failed" error="failed to destroy network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:24:41.441004 kubelet[2009]: E0906 01:24:41.440634 2009 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:24:41.441004 kubelet[2009]: E0906 01:24:41.440769 2009 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1"} Sep 6 01:24:41.441004 kubelet[2009]: E0906 01:24:41.440863 2009 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:24:41.441004 kubelet[2009]: E0906 01:24:41.440944 2009 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2508492e-0028-4e46-b00a-9f1d7bcf3f9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f4kjd" podUID="2508492e-0028-4e46-b00a-9f1d7bcf3f9b" Sep 6 01:24:50.239487 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1490906852.mount: Deactivated successfully. Sep 6 01:24:50.284411 env[1201]: time="2025-09-06T01:24:50.284301021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:50.287497 env[1201]: time="2025-09-06T01:24:50.287437289Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:50.290555 env[1201]: time="2025-09-06T01:24:50.290494939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:50.295774 env[1201]: time="2025-09-06T01:24:50.295700900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:50.297257 env[1201]: time="2025-09-06T01:24:50.297167697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 01:24:50.337744 env[1201]: time="2025-09-06T01:24:50.337575358Z" level=info msg="CreateContainer within sandbox \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 01:24:50.358440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2104439760.mount: Deactivated successfully. Sep 6 01:24:50.363010 env[1201]: time="2025-09-06T01:24:50.362923455Z" level=info msg="CreateContainer within sandbox \"2ac569e82d48492405834d429b619287e09a3a8b77e8eaab12adb6b5d5bddac6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567\"" Sep 6 01:24:50.364959 env[1201]: time="2025-09-06T01:24:50.364922021Z" level=info msg="StartContainer for \"de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567\"" Sep 6 01:24:50.409505 systemd[1]: Started cri-containerd-de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567.scope. Sep 6 01:24:50.445802 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 01:24:50.446126 kernel: audit: type=1400 audit(1757121890.438:1007): avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.438000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.458437 kernel: audit: type=1300 audit(1757121890.438:1007): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb8b87c0648 items=0 ppid=2509 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:50.458570 kernel: audit: type=1327 audit(1757121890.438:1007): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465373635313132343633373831353333653439323534393132353236 Sep 6 01:24:50.438000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb8b87c0648 items=0 ppid=2509 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:50.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465373635313132343633373831353333653439323534393132353236 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.468170 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.473285 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.475139 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.485532 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.493741 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.500743 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.507794 kernel: audit: type=1400 audit(1757121890.442:1008): avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.442000 audit: BPF prog-id=136 op=LOAD Sep 6 01:24:50.442000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002ebeb8 items=0 ppid=2509 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:50.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465373635313132343633373831353333653439323534393132353236 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit: BPF prog-id=137 op=LOAD Sep 6 01:24:50.455000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002ebf08 items=0 ppid=2509 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:50.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465373635313132343633373831353333653439323534393132353236 Sep 6 01:24:50.455000 audit: BPF prog-id=137 op=UNLOAD Sep 6 01:24:50.455000 audit: BPF prog-id=136 op=UNLOAD Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { perfmon } for pid=3156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit[3156]: AVC avc: denied { bpf } for pid=3156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:50.455000 audit: BPF prog-id=138 op=LOAD Sep 6 01:24:50.455000 audit[3156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002ebf98 items=0 ppid=2509 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:50.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465373635313132343633373831353333653439323534393132353236 Sep 6 01:24:50.516043 env[1201]: time="2025-09-06T01:24:50.515934702Z" level=info msg="StartContainer for \"de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567\" returns successfully" Sep 6 01:24:50.878454 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 01:24:50.879677 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 01:24:51.123568 env[1201]: time="2025-09-06T01:24:51.123492023Z" level=info msg="StopPodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\"" Sep 6 01:24:51.265391 env[1201]: time="2025-09-06T01:24:51.265291616Z" level=info msg="StopPodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\"" Sep 6 01:24:51.606476 systemd[1]: run-containerd-runc-k8s.io-de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567-runc.UK6v1P.mount: Deactivated successfully. Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.325 [INFO][3203] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.326 [INFO][3203] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" iface="eth0" netns="/var/run/netns/cni-ed2d79d4-a6a6-05a1-9cd1-29c8798d4d39" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.327 [INFO][3203] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" iface="eth0" netns="/var/run/netns/cni-ed2d79d4-a6a6-05a1-9cd1-29c8798d4d39" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.328 [INFO][3203] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" iface="eth0" netns="/var/run/netns/cni-ed2d79d4-a6a6-05a1-9cd1-29c8798d4d39" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.331 [INFO][3203] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.331 [INFO][3203] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.644 [INFO][3232] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.647 [INFO][3232] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.648 [INFO][3232] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.661 [WARNING][3232] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.662 [INFO][3232] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.664 [INFO][3232] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:51.669798 env[1201]: 2025-09-06 01:24:51.666 [INFO][3203] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:24:51.675045 env[1201]: time="2025-09-06T01:24:51.674962454Z" level=info msg="TearDown network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" successfully" Sep 6 01:24:51.675479 env[1201]: time="2025-09-06T01:24:51.675177566Z" level=info msg="StopPodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" returns successfully" Sep 6 01:24:51.677534 systemd[1]: run-netns-cni\x2ded2d79d4\x2da6a6\x2d05a1\x2d9cd1\x2d29c8798d4d39.mount: Deactivated successfully. Sep 6 01:24:51.681101 env[1201]: time="2025-09-06T01:24:51.681063805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b66569c6-zkbvb,Uid:68446d0a-14e3-4523-a08c-0c70cebecb91,Namespace:calico-system,Attempt:1,}" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.406 [INFO][3226] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.407 [INFO][3226] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" iface="eth0" netns="/var/run/netns/cni-2700df50-69b2-53b4-6814-b7bcd94a0ecf" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.407 [INFO][3226] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" iface="eth0" netns="/var/run/netns/cni-2700df50-69b2-53b4-6814-b7bcd94a0ecf" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.407 [INFO][3226] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" iface="eth0" netns="/var/run/netns/cni-2700df50-69b2-53b4-6814-b7bcd94a0ecf" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.407 [INFO][3226] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.407 [INFO][3226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.646 [INFO][3238] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.647 [INFO][3238] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.679 [INFO][3238] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.697 [WARNING][3238] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.697 [INFO][3238] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.700 [INFO][3238] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:51.724832 env[1201]: 2025-09-06 01:24:51.704 [INFO][3226] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:24:51.726819 env[1201]: time="2025-09-06T01:24:51.726318762Z" level=info msg="TearDown network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" successfully" Sep 6 01:24:51.726819 env[1201]: time="2025-09-06T01:24:51.726364476Z" level=info msg="StopPodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" returns successfully" Sep 6 01:24:51.854485 kubelet[2009]: I0906 01:24:51.854414 2009 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73a31356-b575-4210-9fd8-adaaab10c463-whisker-ca-bundle\") pod \"73a31356-b575-4210-9fd8-adaaab10c463\" (UID: \"73a31356-b575-4210-9fd8-adaaab10c463\") " Sep 6 01:24:51.856022 kubelet[2009]: I0906 01:24:51.854530 2009 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/73a31356-b575-4210-9fd8-adaaab10c463-whisker-backend-key-pair\") pod \"73a31356-b575-4210-9fd8-adaaab10c463\" (UID: \"73a31356-b575-4210-9fd8-adaaab10c463\") " Sep 6 01:24:51.856022 kubelet[2009]: I0906 01:24:51.854569 2009 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-7bf22\" (UniqueName: \"kubernetes.io/projected/73a31356-b575-4210-9fd8-adaaab10c463-kube-api-access-7bf22\") pod \"73a31356-b575-4210-9fd8-adaaab10c463\" (UID: \"73a31356-b575-4210-9fd8-adaaab10c463\") " Sep 6 01:24:51.882116 kubelet[2009]: I0906 01:24:51.871426 2009 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/73a31356-b575-4210-9fd8-adaaab10c463-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "73a31356-b575-4210-9fd8-adaaab10c463" (UID: "73a31356-b575-4210-9fd8-adaaab10c463"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Sep 6 01:24:51.891064 kubelet[2009]: I0906 01:24:51.890959 2009 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/73a31356-b575-4210-9fd8-adaaab10c463-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "73a31356-b575-4210-9fd8-adaaab10c463" (UID: "73a31356-b575-4210-9fd8-adaaab10c463"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" Sep 6 01:24:51.892977 kubelet[2009]: I0906 01:24:51.892928 2009 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/73a31356-b575-4210-9fd8-adaaab10c463-kube-api-access-7bf22" (OuterVolumeSpecName: "kube-api-access-7bf22") pod "73a31356-b575-4210-9fd8-adaaab10c463" (UID: "73a31356-b575-4210-9fd8-adaaab10c463"). InnerVolumeSpecName "kube-api-access-7bf22". PluginName "kubernetes.io/projected", VolumeGidValue "" Sep 6 01:24:51.955810 kubelet[2009]: I0906 01:24:51.955754 2009 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73a31356-b575-4210-9fd8-adaaab10c463-whisker-ca-bundle\") on node \"srv-bf5vc.gb1.brightbox.com\" DevicePath \"\"" Sep 6 01:24:51.955810 kubelet[2009]: I0906 01:24:51.955809 2009 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/73a31356-b575-4210-9fd8-adaaab10c463-whisker-backend-key-pair\") on node \"srv-bf5vc.gb1.brightbox.com\" DevicePath \"\"" Sep 6 01:24:51.956131 kubelet[2009]: I0906 01:24:51.955829 2009 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-7bf22\" (UniqueName: \"kubernetes.io/projected/73a31356-b575-4210-9fd8-adaaab10c463-kube-api-access-7bf22\") on node \"srv-bf5vc.gb1.brightbox.com\" DevicePath \"\"" Sep 6 01:24:52.033944 systemd-networkd[1024]: caliac5fce9843d: Link UP Sep 6 01:24:52.044803 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:52.049267 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac5fce9843d: link becomes ready Sep 6 01:24:52.048911 systemd-networkd[1024]: caliac5fce9843d: Gained carrier Sep 6 01:24:52.098311 kubelet[2009]: I0906 01:24:52.094162 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-n726l" podStartSLOduration=2.618117402 podStartE2EDuration="28.088804497s" podCreationTimestamp="2025-09-06 01:24:24 +0000 UTC" firstStartedPulling="2025-09-06 01:24:24.828574751 +0000 UTC m=+21.990531644" lastFinishedPulling="2025-09-06 01:24:50.299261838 +0000 UTC m=+47.461218739" observedRunningTime="2025-09-06 01:24:51.551216332 +0000 UTC m=+48.713173240" watchObservedRunningTime="2025-09-06 01:24:52.088804497 +0000 UTC m=+49.250761392" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.768 [INFO][3263] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.792 [INFO][3263] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0 calico-kube-controllers-b66569c6- calico-system 68446d0a-14e3-4523-a08c-0c70cebecb91 881 0 2025-09-06 01:24:24 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:b66569c6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com calico-kube-controllers-b66569c6-zkbvb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliac5fce9843d [] [] }} ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.792 [INFO][3263] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.859 [INFO][3279] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" HandleID="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.861 [INFO][3279] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" HandleID="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"calico-kube-controllers-b66569c6-zkbvb", "timestamp":"2025-09-06 01:24:51.859012157 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.863 [INFO][3279] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.863 [INFO][3279] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.864 [INFO][3279] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.926 [INFO][3279] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.959 [INFO][3279] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.968 [INFO][3279] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.971 [INFO][3279] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.977 [INFO][3279] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.977 [INFO][3279] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.979 [INFO][3279] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.986 [INFO][3279] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.996 [INFO][3279] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.65/26] block=192.168.47.64/26 handle="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.996 [INFO][3279] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.65/26] handle="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.996 [INFO][3279] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:52.099909 env[1201]: 2025-09-06 01:24:51.996 [INFO][3279] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.65/26] IPv6=[] ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" HandleID="k8s-pod-network.9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.101846 env[1201]: 2025-09-06 01:24:51.999 [INFO][3263] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0", GenerateName:"calico-kube-controllers-b66569c6-", Namespace:"calico-system", SelfLink:"", UID:"68446d0a-14e3-4523-a08c-0c70cebecb91", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b66569c6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-b66569c6-zkbvb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.47.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliac5fce9843d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:52.101846 env[1201]: 2025-09-06 01:24:51.999 [INFO][3263] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.65/32] ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.101846 env[1201]: 2025-09-06 01:24:52.000 [INFO][3263] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliac5fce9843d ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.101846 env[1201]: 2025-09-06 01:24:52.052 [INFO][3263] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.101846 env[1201]: 2025-09-06 01:24:52.052 [INFO][3263] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0", GenerateName:"calico-kube-controllers-b66569c6-", Namespace:"calico-system", SelfLink:"", UID:"68446d0a-14e3-4523-a08c-0c70cebecb91", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b66569c6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b", Pod:"calico-kube-controllers-b66569c6-zkbvb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.47.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliac5fce9843d", MAC:"16:82:62:3a:cf:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:52.101846 env[1201]: 2025-09-06 01:24:52.082 [INFO][3263] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b" Namespace="calico-system" Pod="calico-kube-controllers-b66569c6-zkbvb" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:24:52.151947 env[1201]: time="2025-09-06T01:24:52.150203390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:52.151947 env[1201]: time="2025-09-06T01:24:52.150301473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:52.151947 env[1201]: time="2025-09-06T01:24:52.150321732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:52.155499 env[1201]: time="2025-09-06T01:24:52.154590383Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b pid=3312 runtime=io.containerd.runc.v2 Sep 6 01:24:52.180702 systemd[1]: Started cri-containerd-9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b.scope. Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.208000 audit: BPF prog-id=139 op=LOAD Sep 6 01:24:52.209000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.209000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3312 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:52.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313164363537356331336430346134376363656361623364636433 Sep 6 01:24:52.209000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.209000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3312 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:52.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313164363537356331336430346134376363656361623364636433 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.210000 audit: BPF prog-id=140 op=LOAD Sep 6 01:24:52.210000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000392990 items=0 ppid=3312 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:52.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313164363537356331336430346134376363656361623364636433 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.211000 audit: BPF prog-id=141 op=LOAD Sep 6 01:24:52.211000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003929d8 items=0 ppid=3312 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:52.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313164363537356331336430346134376363656361623364636433 Sep 6 01:24:52.212000 audit: BPF prog-id=141 op=UNLOAD Sep 6 01:24:52.212000 audit: BPF prog-id=140 op=UNLOAD Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { perfmon } for pid=3325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit[3325]: AVC avc: denied { bpf } for pid=3325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:52.213000 audit: BPF prog-id=142 op=LOAD Sep 6 01:24:52.213000 audit[3325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000392de8 items=0 ppid=3312 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:52.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313164363537356331336430346134376363656361623364636433 Sep 6 01:24:52.248247 systemd[1]: run-netns-cni\x2d2700df50\x2d69b2\x2d53b4\x2d6814\x2db7bcd94a0ecf.mount: Deactivated successfully. Sep 6 01:24:52.248385 systemd[1]: var-lib-kubelet-pods-73a31356\x2db575\x2d4210\x2d9fd8\x2dadaaab10c463-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d7bf22.mount: Deactivated successfully. Sep 6 01:24:52.248505 systemd[1]: var-lib-kubelet-pods-73a31356\x2db575\x2d4210\x2d9fd8\x2dadaaab10c463-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 6 01:24:52.288744 env[1201]: time="2025-09-06T01:24:52.288613201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b66569c6-zkbvb,Uid:68446d0a-14e3-4523-a08c-0c70cebecb91,Namespace:calico-system,Attempt:1,} returns sandbox id \"9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b\"" Sep 6 01:24:52.291662 env[1201]: time="2025-09-06T01:24:52.291612985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 6 01:24:52.509584 systemd[1]: Removed slice kubepods-besteffort-pod73a31356_b575_4210_9fd8_adaaab10c463.slice. Sep 6 01:24:52.527710 systemd[1]: run-containerd-runc-k8s.io-de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567-runc.MwAwHh.mount: Deactivated successfully. Sep 6 01:24:52.677363 systemd[1]: Created slice kubepods-besteffort-podf2c57839_c455_493c_8373_1d9d22149604.slice. Sep 6 01:24:52.762087 kubelet[2009]: I0906 01:24:52.761904 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mgcn7\" (UniqueName: \"kubernetes.io/projected/f2c57839-c455-493c-8373-1d9d22149604-kube-api-access-mgcn7\") pod \"whisker-856c54478-cmxtz\" (UID: \"f2c57839-c455-493c-8373-1d9d22149604\") " pod="calico-system/whisker-856c54478-cmxtz" Sep 6 01:24:52.763350 kubelet[2009]: I0906 01:24:52.763319 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f2c57839-c455-493c-8373-1d9d22149604-whisker-backend-key-pair\") pod \"whisker-856c54478-cmxtz\" (UID: \"f2c57839-c455-493c-8373-1d9d22149604\") " pod="calico-system/whisker-856c54478-cmxtz" Sep 6 01:24:52.763439 kubelet[2009]: I0906 01:24:52.763379 2009 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f2c57839-c455-493c-8373-1d9d22149604-whisker-ca-bundle\") pod \"whisker-856c54478-cmxtz\" (UID: \"f2c57839-c455-493c-8373-1d9d22149604\") " pod="calico-system/whisker-856c54478-cmxtz" Sep 6 01:24:52.984545 env[1201]: time="2025-09-06T01:24:52.983947850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-856c54478-cmxtz,Uid:f2c57839-c455-493c-8373-1d9d22149604,Namespace:calico-system,Attempt:0,}" Sep 6 01:24:53.119503 env[1201]: time="2025-09-06T01:24:53.119365476Z" level=info msg="StopPodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\"" Sep 6 01:24:53.128696 kubelet[2009]: I0906 01:24:53.128397 2009 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="73a31356-b575-4210-9fd8-adaaab10c463" path="/var/lib/kubelet/pods/73a31356-b575-4210-9fd8-adaaab10c463/volumes" Sep 6 01:24:53.184338 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:53.184873 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie09a7b95524: link becomes ready Sep 6 01:24:53.189501 systemd-networkd[1024]: calie09a7b95524: Link UP Sep 6 01:24:53.191230 systemd-networkd[1024]: calie09a7b95524: Gained carrier Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.031 [INFO][3371] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.056 [INFO][3371] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0 whisker-856c54478- calico-system f2c57839-c455-493c-8373-1d9d22149604 911 0 2025-09-06 01:24:52 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:856c54478 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com whisker-856c54478-cmxtz eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calie09a7b95524 [] [] }} ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.056 [INFO][3371] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.109 [INFO][3383] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" HandleID="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.110 [INFO][3383] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" HandleID="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1210), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"whisker-856c54478-cmxtz", "timestamp":"2025-09-06 01:24:53.109868512 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.111 [INFO][3383] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.111 [INFO][3383] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.111 [INFO][3383] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.129 [INFO][3383] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.135 [INFO][3383] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.145 [INFO][3383] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.148 [INFO][3383] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.151 [INFO][3383] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.151 [INFO][3383] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.153 [INFO][3383] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.159 [INFO][3383] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.168 [INFO][3383] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.66/26] block=192.168.47.64/26 handle="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.168 [INFO][3383] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.66/26] handle="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.168 [INFO][3383] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:53.242374 env[1201]: 2025-09-06 01:24:53.168 [INFO][3383] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.66/26] IPv6=[] ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" HandleID="k8s-pod-network.0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.244131 env[1201]: 2025-09-06 01:24:53.171 [INFO][3371] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0", GenerateName:"whisker-856c54478-", Namespace:"calico-system", SelfLink:"", UID:"f2c57839-c455-493c-8373-1d9d22149604", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"856c54478", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"whisker-856c54478-cmxtz", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.47.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calie09a7b95524", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:53.244131 env[1201]: 2025-09-06 01:24:53.171 [INFO][3371] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.66/32] ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.244131 env[1201]: 2025-09-06 01:24:53.171 [INFO][3371] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie09a7b95524 ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.244131 env[1201]: 2025-09-06 01:24:53.195 [INFO][3371] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.244131 env[1201]: 2025-09-06 01:24:53.196 [INFO][3371] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0", GenerateName:"whisker-856c54478-", Namespace:"calico-system", SelfLink:"", UID:"f2c57839-c455-493c-8373-1d9d22149604", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"856c54478", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf", Pod:"whisker-856c54478-cmxtz", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.47.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calie09a7b95524", MAC:"92:73:3b:7c:dc:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:53.244131 env[1201]: 2025-09-06 01:24:53.229 [INFO][3371] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf" Namespace="calico-system" Pod="whisker-856c54478-cmxtz" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--856c54478--cmxtz-eth0" Sep 6 01:24:53.294093 env[1201]: time="2025-09-06T01:24:53.293341507Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:53.294093 env[1201]: time="2025-09-06T01:24:53.293389666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:53.294093 env[1201]: time="2025-09-06T01:24:53.293409631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:53.294093 env[1201]: time="2025-09-06T01:24:53.293588652Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf pid=3445 runtime=io.containerd.runc.v2 Sep 6 01:24:53.344121 systemd[1]: Started cri-containerd-0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf.scope. Sep 6 01:24:53.366319 systemd[1]: run-containerd-runc-k8s.io-0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf-runc.j52wiB.mount: Deactivated successfully. Sep 6 01:24:53.388000 audit[3436]: AVC avc: denied { write } for pid=3436 comm="tee" name="fd" dev="proc" ino=29495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.388000 audit[3436]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd67dde7be a2=241 a3=1b6 items=1 ppid=3413 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.388000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 01:24:53.388000 audit: PATH item=0 name="/dev/fd/63" inode=30495 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.388000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.356 [INFO][3399] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.356 [INFO][3399] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" iface="eth0" netns="/var/run/netns/cni-addbaed4-1d49-36d4-145b-5b5116af3bf9" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.356 [INFO][3399] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" iface="eth0" netns="/var/run/netns/cni-addbaed4-1d49-36d4-145b-5b5116af3bf9" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.362 [INFO][3399] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" iface="eth0" netns="/var/run/netns/cni-addbaed4-1d49-36d4-145b-5b5116af3bf9" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.362 [INFO][3399] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.363 [INFO][3399] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.445 [INFO][3477] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.446 [INFO][3477] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.446 [INFO][3477] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.459 [WARNING][3477] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.459 [INFO][3477] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.461 [INFO][3477] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:53.466680 env[1201]: 2025-09-06 01:24:53.464 [INFO][3399] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:24:53.467632 env[1201]: time="2025-09-06T01:24:53.466812208Z" level=info msg="TearDown network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" successfully" Sep 6 01:24:53.467632 env[1201]: time="2025-09-06T01:24:53.466860864Z" level=info msg="StopPodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" returns successfully" Sep 6 01:24:53.468648 env[1201]: time="2025-09-06T01:24:53.468267355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4kjd,Uid:2508492e-0028-4e46-b00a-9f1d7bcf3f9b,Namespace:calico-system,Attempt:1,}" Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.476000 audit: BPF prog-id=143 op=LOAD Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3445 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343234383366326337313062366463626662646261643534616537 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3445 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343234383366326337313062366463626662646261643534616537 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit: BPF prog-id=144 op=LOAD Sep 6 01:24:53.477000 audit[3457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000321a60 items=0 ppid=3445 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343234383366326337313062366463626662646261643534616537 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit: BPF prog-id=145 op=LOAD Sep 6 01:24:53.477000 audit[3457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000321aa8 items=0 ppid=3445 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343234383366326337313062366463626662646261643534616537 Sep 6 01:24:53.477000 audit: BPF prog-id=145 op=UNLOAD Sep 6 01:24:53.477000 audit: BPF prog-id=144 op=UNLOAD Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { perfmon } for pid=3457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit[3457]: AVC avc: denied { bpf } for pid=3457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:53.477000 audit: BPF prog-id=146 op=LOAD Sep 6 01:24:53.477000 audit[3457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000321eb8 items=0 ppid=3445 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343234383366326337313062366463626662646261643534616537 Sep 6 01:24:53.492000 audit[3499]: AVC avc: denied { write } for pid=3499 comm="tee" name="fd" dev="proc" ino=29593 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.492000 audit[3499]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd97ad07ae a2=241 a3=1b6 items=1 ppid=3412 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.492000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 01:24:53.492000 audit: PATH item=0 name="/dev/fd/63" inode=29527 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.492000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.506000 audit[3492]: AVC avc: denied { write } for pid=3492 comm="tee" name="fd" dev="proc" ino=29595 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.506000 audit[3492]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc642af7bd a2=241 a3=1b6 items=1 ppid=3415 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.506000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 01:24:53.506000 audit: PATH item=0 name="/dev/fd/63" inode=29516 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.506000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.510000 audit[3486]: AVC avc: denied { write } for pid=3486 comm="tee" name="fd" dev="proc" ino=29599 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.510000 audit[3486]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde60d17bd a2=241 a3=1b6 items=1 ppid=3416 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.510000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 01:24:53.510000 audit: PATH item=0 name="/dev/fd/63" inode=29513 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.510000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.592000 audit[3538]: AVC avc: denied { write } for pid=3538 comm="tee" name="fd" dev="proc" ino=30628 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.596170 systemd-networkd[1024]: caliac5fce9843d: Gained IPv6LL Sep 6 01:24:53.592000 audit[3538]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca96ba7bf a2=241 a3=1b6 items=1 ppid=3442 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.592000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 01:24:53.592000 audit: PATH item=0 name="/dev/fd/63" inode=29612 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.643000 audit[3554]: AVC avc: denied { write } for pid=3554 comm="tee" name="fd" dev="proc" ino=30634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.740000 audit[3541]: AVC avc: denied { write } for pid=3541 comm="tee" name="fd" dev="proc" ino=30648 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:24:53.643000 audit[3554]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8e2357ad a2=241 a3=1b6 items=1 ppid=3454 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.740000 audit[3541]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd25a2a7bd a2=241 a3=1b6 items=1 ppid=3421 pid=3541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:53.740000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 01:24:53.643000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 01:24:53.740000 audit: PATH item=0 name="/dev/fd/63" inode=29621 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.643000 audit: PATH item=0 name="/dev/fd/63" inode=29647 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:24:53.740000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:24:53.791848 env[1201]: time="2025-09-06T01:24:53.788381095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-856c54478-cmxtz,Uid:f2c57839-c455-493c-8373-1d9d22149604,Namespace:calico-system,Attempt:0,} returns sandbox id \"0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf\"" Sep 6 01:24:54.023073 systemd-networkd[1024]: calid501eb1e15b: Link UP Sep 6 01:24:54.033773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid501eb1e15b: link becomes ready Sep 6 01:24:54.034197 systemd-networkd[1024]: calid501eb1e15b: Gained carrier Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.655 [INFO][3511] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.720 [INFO][3511] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0 csi-node-driver- calico-system 2508492e-0028-4e46-b00a-9f1d7bcf3f9b 920 0 2025-09-06 01:24:24 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:856c6b598f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com csi-node-driver-f4kjd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid501eb1e15b [] [] }} ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.720 [INFO][3511] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.902 [INFO][3576] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" HandleID="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.902 [INFO][3576] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" HandleID="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029e040), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"csi-node-driver-f4kjd", "timestamp":"2025-09-06 01:24:53.902089532 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.902 [INFO][3576] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.902 [INFO][3576] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.902 [INFO][3576] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.921 [INFO][3576] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.931 [INFO][3576] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.940 [INFO][3576] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.943 [INFO][3576] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.950 [INFO][3576] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.950 [INFO][3576] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.952 [INFO][3576] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112 Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.960 [INFO][3576] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.971 [INFO][3576] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.67/26] block=192.168.47.64/26 handle="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.971 [INFO][3576] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.67/26] handle="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.971 [INFO][3576] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:54.081478 env[1201]: 2025-09-06 01:24:53.971 [INFO][3576] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.67/26] IPv6=[] ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" HandleID="k8s-pod-network.c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.083650 env[1201]: 2025-09-06 01:24:53.973 [INFO][3511] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2508492e-0028-4e46-b00a-9f1d7bcf3f9b", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-f4kjd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid501eb1e15b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:54.083650 env[1201]: 2025-09-06 01:24:53.974 [INFO][3511] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.67/32] ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.083650 env[1201]: 2025-09-06 01:24:53.974 [INFO][3511] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid501eb1e15b ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.083650 env[1201]: 2025-09-06 01:24:54.025 [INFO][3511] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.083650 env[1201]: 2025-09-06 01:24:54.047 [INFO][3511] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2508492e-0028-4e46-b00a-9f1d7bcf3f9b", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112", Pod:"csi-node-driver-f4kjd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid501eb1e15b", MAC:"56:97:d9:ce:bb:02", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:54.083650 env[1201]: 2025-09-06 01:24:54.077 [INFO][3511] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112" Namespace="calico-system" Pod="csi-node-driver-f4kjd" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:24:54.131067 env[1201]: time="2025-09-06T01:24:54.123911730Z" level=info msg="StopPodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\"" Sep 6 01:24:54.131067 env[1201]: time="2025-09-06T01:24:54.125161747Z" level=info msg="StopPodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\"" Sep 6 01:24:54.131067 env[1201]: time="2025-09-06T01:24:54.130770798Z" level=info msg="StopPodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\"" Sep 6 01:24:54.132631 env[1201]: time="2025-09-06T01:24:54.132581305Z" level=info msg="StopPodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\"" Sep 6 01:24:54.169249 env[1201]: time="2025-09-06T01:24:54.154362624Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:54.169249 env[1201]: time="2025-09-06T01:24:54.154480096Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:54.169249 env[1201]: time="2025-09-06T01:24:54.162999457Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:54.169249 env[1201]: time="2025-09-06T01:24:54.166962433Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112 pid=3611 runtime=io.containerd.runc.v2 Sep 6 01:24:54.221127 systemd[1]: Started cri-containerd-c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112.scope. Sep 6 01:24:54.249133 systemd[1]: run-netns-cni\x2daddbaed4\x2d1d49\x2d36d4\x2d145b\x2d5b5116af3bf9.mount: Deactivated successfully. Sep 6 01:24:54.406018 systemd-networkd[1024]: calie09a7b95524: Gained IPv6LL Sep 6 01:24:54.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.590000 audit: BPF prog-id=147 op=LOAD Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3611 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339623738613761326630666635353734666263373563333135383235 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3611 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339623738613761326630666635353734666263373563333135383235 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.594000 audit: BPF prog-id=148 op=LOAD Sep 6 01:24:54.594000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b69d0 items=0 ppid=3611 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339623738613761326630666635353734666263373563333135383235 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit: BPF prog-id=149 op=LOAD Sep 6 01:24:54.595000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b6a18 items=0 ppid=3611 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339623738613761326630666635353734666263373563333135383235 Sep 6 01:24:54.595000 audit: BPF prog-id=149 op=UNLOAD Sep 6 01:24:54.595000 audit: BPF prog-id=148 op=UNLOAD Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.595000 audit: BPF prog-id=150 op=LOAD Sep 6 01:24:54.595000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6e28 items=0 ppid=3611 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339623738613761326630666635353734666263373563333135383235 Sep 6 01:24:54.843332 env[1201]: time="2025-09-06T01:24:54.843264444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f4kjd,Uid:2508492e-0028-4e46-b00a-9f1d7bcf3f9b,Namespace:calico-system,Attempt:1,} returns sandbox id \"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112\"" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.565 [INFO][3659] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.565 [INFO][3659] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" iface="eth0" netns="/var/run/netns/cni-238417e7-a6b8-abe5-ce12-131186cf0094" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.565 [INFO][3659] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" iface="eth0" netns="/var/run/netns/cni-238417e7-a6b8-abe5-ce12-131186cf0094" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.576 [INFO][3659] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" iface="eth0" netns="/var/run/netns/cni-238417e7-a6b8-abe5-ce12-131186cf0094" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.586 [INFO][3659] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.587 [INFO][3659] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.854 [INFO][3694] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.854 [INFO][3694] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.854 [INFO][3694] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.870 [WARNING][3694] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.870 [INFO][3694] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.876 [INFO][3694] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:54.887810 env[1201]: 2025-09-06 01:24:54.885 [INFO][3659] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:24:54.891638 systemd[1]: run-netns-cni\x2d238417e7\x2da6b8\x2dabe5\x2dce12\x2d131186cf0094.mount: Deactivated successfully. Sep 6 01:24:54.893424 env[1201]: time="2025-09-06T01:24:54.893357274Z" level=info msg="TearDown network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" successfully" Sep 6 01:24:54.893507 env[1201]: time="2025-09-06T01:24:54.893422579Z" level=info msg="StopPodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" returns successfully" Sep 6 01:24:54.894488 env[1201]: time="2025-09-06T01:24:54.894438199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-p8px4,Uid:47db2387-c90d-4f84-b7fe-e2c1c0ca0443,Namespace:kube-system,Attempt:1,}" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.663 [INFO][3663] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.663 [INFO][3663] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" iface="eth0" netns="/var/run/netns/cni-d8f7a437-474e-0e74-4807-cf60bffe4aa6" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.663 [INFO][3663] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" iface="eth0" netns="/var/run/netns/cni-d8f7a437-474e-0e74-4807-cf60bffe4aa6" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.663 [INFO][3663] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" iface="eth0" netns="/var/run/netns/cni-d8f7a437-474e-0e74-4807-cf60bffe4aa6" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.663 [INFO][3663] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.663 [INFO][3663] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.856 [INFO][3707] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.856 [INFO][3707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.875 [INFO][3707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.886 [WARNING][3707] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.886 [INFO][3707] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.899 [INFO][3707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:54.916555 env[1201]: 2025-09-06 01:24:54.905 [INFO][3663] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:24:54.921639 env[1201]: time="2025-09-06T01:24:54.921136861Z" level=info msg="TearDown network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" successfully" Sep 6 01:24:54.921639 env[1201]: time="2025-09-06T01:24:54.921182463Z" level=info msg="StopPodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" returns successfully" Sep 6 01:24:54.919973 systemd[1]: run-netns-cni\x2dd8f7a437\x2d474e\x2d0e74\x2d4807\x2dcf60bffe4aa6.mount: Deactivated successfully. Sep 6 01:24:54.922387 env[1201]: time="2025-09-06T01:24:54.922343326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-bbd56,Uid:b425bfaf-5f54-4b5c-88f3-3e0319345d4a,Namespace:kube-system,Attempt:1,}" Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.931000 audit: BPF prog-id=151 op=LOAD Sep 6 01:24:54.931000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe084f65c0 a2=98 a3=1fffffffffffffff items=0 ppid=3418 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.931000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:54.935000 audit: BPF prog-id=151 op=UNLOAD Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit: BPF prog-id=152 op=LOAD Sep 6 01:24:54.936000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe084f64a0 a2=94 a3=3 items=0 ppid=3418 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.936000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:54.936000 audit: BPF prog-id=152 op=UNLOAD Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.936000 audit: BPF prog-id=153 op=LOAD Sep 6 01:24:54.936000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe084f64e0 a2=94 a3=7ffe084f66c0 items=0 ppid=3418 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.936000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:54.938000 audit: BPF prog-id=153 op=UNLOAD Sep 6 01:24:54.938000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.938000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe084f65b0 a2=50 a3=a000000085 items=0 ppid=3418 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.938000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.970000 audit: BPF prog-id=154 op=LOAD Sep 6 01:24:54.970000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbbdf5f60 a2=98 a3=3 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.970000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:54.970000 audit: BPF prog-id=154 op=UNLOAD Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit: BPF prog-id=155 op=LOAD Sep 6 01:24:54.986000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbbdf5d50 a2=94 a3=54428f items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.986000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:54.986000 audit: BPF prog-id=155 op=UNLOAD Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:54.986000 audit: BPF prog-id=156 op=LOAD Sep 6 01:24:54.986000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbbdf5d80 a2=94 a3=2 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:54.986000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:54.986000 audit: BPF prog-id=156 op=UNLOAD Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.638 [INFO][3654] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.638 [INFO][3654] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" iface="eth0" netns="/var/run/netns/cni-274b5b8d-3966-dbfe-07ba-b66d3535fb80" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.638 [INFO][3654] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" iface="eth0" netns="/var/run/netns/cni-274b5b8d-3966-dbfe-07ba-b66d3535fb80" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.638 [INFO][3654] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" iface="eth0" netns="/var/run/netns/cni-274b5b8d-3966-dbfe-07ba-b66d3535fb80" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.638 [INFO][3654] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.638 [INFO][3654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.985 [INFO][3699] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.986 [INFO][3699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:54.986 [INFO][3699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:55.005 [WARNING][3699] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:55.005 [INFO][3699] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:55.012 [INFO][3699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:55.038201 env[1201]: 2025-09-06 01:24:55.015 [INFO][3654] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:24:55.039459 env[1201]: time="2025-09-06T01:24:55.039408280Z" level=info msg="TearDown network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" successfully" Sep 6 01:24:55.039606 env[1201]: time="2025-09-06T01:24:55.039572886Z" level=info msg="StopPodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" returns successfully" Sep 6 01:24:55.063375 env[1201]: time="2025-09-06T01:24:55.063326004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-ksp96,Uid:a8875be0-eb58-442a-b36c-f99a81a461bf,Namespace:calico-apiserver,Attempt:1,}" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.623 [INFO][3664] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.623 [INFO][3664] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" iface="eth0" netns="/var/run/netns/cni-8b636735-1365-b139-312e-170902deac2e" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.623 [INFO][3664] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" iface="eth0" netns="/var/run/netns/cni-8b636735-1365-b139-312e-170902deac2e" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.624 [INFO][3664] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" iface="eth0" netns="/var/run/netns/cni-8b636735-1365-b139-312e-170902deac2e" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.624 [INFO][3664] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.624 [INFO][3664] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.983 [INFO][3696] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:54.989 [INFO][3696] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:55.012 [INFO][3696] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:55.037 [WARNING][3696] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:55.037 [INFO][3696] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:55.046 [INFO][3696] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:55.069219 env[1201]: 2025-09-06 01:24:55.051 [INFO][3664] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:24:55.070984 env[1201]: time="2025-09-06T01:24:55.069658248Z" level=info msg="TearDown network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" successfully" Sep 6 01:24:55.070984 env[1201]: time="2025-09-06T01:24:55.069697175Z" level=info msg="StopPodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" returns successfully" Sep 6 01:24:55.072145 env[1201]: time="2025-09-06T01:24:55.072095019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-wwmbx,Uid:5edf1e57-2883-47ef-ba53-454041fc8724,Namespace:calico-system,Attempt:1,}" Sep 6 01:24:55.171445 env[1201]: time="2025-09-06T01:24:55.171203427Z" level=info msg="StopPodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\"" Sep 6 01:24:55.249470 systemd[1]: run-netns-cni\x2d274b5b8d\x2d3966\x2ddbfe\x2d07ba\x2db66d3535fb80.mount: Deactivated successfully. Sep 6 01:24:55.249607 systemd[1]: run-netns-cni\x2d8b636735\x2d1365\x2db139\x2d312e\x2d170902deac2e.mount: Deactivated successfully. Sep 6 01:24:55.515969 systemd-networkd[1024]: calid501eb1e15b: Gained IPv6LL Sep 6 01:24:55.815550 systemd-networkd[1024]: cali493dab0a152: Link UP Sep 6 01:24:55.826202 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:55.828875 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali493dab0a152: link becomes ready Sep 6 01:24:55.828176 systemd-networkd[1024]: cali493dab0a152: Gained carrier Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.317 [INFO][3748] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0 coredns-7c65d6cfc9- kube-system 47db2387-c90d-4f84-b7fe-e2c1c0ca0443 931 0 2025-09-06 01:24:07 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com coredns-7c65d6cfc9-p8px4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali493dab0a152 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.318 [INFO][3748] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.641 [INFO][3797] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" HandleID="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.641 [INFO][3797] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" HandleID="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0006306f0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"coredns-7c65d6cfc9-p8px4", "timestamp":"2025-09-06 01:24:55.641265177 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.641 [INFO][3797] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.642 [INFO][3797] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.642 [INFO][3797] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.682 [INFO][3797] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.704 [INFO][3797] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.724 [INFO][3797] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.730 [INFO][3797] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.735 [INFO][3797] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.735 [INFO][3797] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.744 [INFO][3797] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617 Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.763 [INFO][3797] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.789 [INFO][3797] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.68/26] block=192.168.47.64/26 handle="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.789 [INFO][3797] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.68/26] handle="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.789 [INFO][3797] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:55.911892 env[1201]: 2025-09-06 01:24:55.789 [INFO][3797] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.68/26] IPv6=[] ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" HandleID="k8s-pod-network.1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:55.914592 env[1201]: 2025-09-06 01:24:55.795 [INFO][3748] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"47db2387-c90d-4f84-b7fe-e2c1c0ca0443", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7c65d6cfc9-p8px4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali493dab0a152", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:55.914592 env[1201]: 2025-09-06 01:24:55.799 [INFO][3748] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.68/32] ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:55.914592 env[1201]: 2025-09-06 01:24:55.799 [INFO][3748] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali493dab0a152 ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:55.914592 env[1201]: 2025-09-06 01:24:55.833 [INFO][3748] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:55.914592 env[1201]: 2025-09-06 01:24:55.855 [INFO][3748] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"47db2387-c90d-4f84-b7fe-e2c1c0ca0443", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617", Pod:"coredns-7c65d6cfc9-p8px4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali493dab0a152", MAC:"36:6b:4b:04:1f:53", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:55.914592 env[1201]: 2025-09-06 01:24:55.899 [INFO][3748] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617" Namespace="kube-system" Pod="coredns-7c65d6cfc9-p8px4" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:24:56.022784 env[1201]: time="2025-09-06T01:24:56.021672019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:56.022784 env[1201]: time="2025-09-06T01:24:56.021772852Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:56.022784 env[1201]: time="2025-09-06T01:24:56.021789694Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:56.022784 env[1201]: time="2025-09-06T01:24:56.022014972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617 pid=3875 runtime=io.containerd.runc.v2 Sep 6 01:24:56.061306 systemd-networkd[1024]: cali783196fe312: Link UP Sep 6 01:24:56.067752 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali783196fe312: link becomes ready Sep 6 01:24:56.068404 systemd-networkd[1024]: cali783196fe312: Gained carrier Sep 6 01:24:56.081591 systemd[1]: Started cri-containerd-1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617.scope. Sep 6 01:24:56.098674 systemd[1]: run-containerd-runc-k8s.io-1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617-runc.PX3nMk.mount: Deactivated successfully. Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.266 [INFO][3737] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0 coredns-7c65d6cfc9- kube-system b425bfaf-5f54-4b5c-88f3-3e0319345d4a 934 0 2025-09-06 01:24:07 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com coredns-7c65d6cfc9-bbd56 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali783196fe312 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.266 [INFO][3737] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.764 [INFO][3792] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" HandleID="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.770 [INFO][3792] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" HandleID="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00021fcd0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"coredns-7c65d6cfc9-bbd56", "timestamp":"2025-09-06 01:24:55.764548697 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.770 [INFO][3792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.792 [INFO][3792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.792 [INFO][3792] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.842 [INFO][3792] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.900 [INFO][3792] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.931 [INFO][3792] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.941 [INFO][3792] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.946 [INFO][3792] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.947 [INFO][3792] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.954 [INFO][3792] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.965 [INFO][3792] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.989 [INFO][3792] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.69/26] block=192.168.47.64/26 handle="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.989 [INFO][3792] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.69/26] handle="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.989 [INFO][3792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:56.138244 env[1201]: 2025-09-06 01:24:55.989 [INFO][3792] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.69/26] IPv6=[] ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" HandleID="k8s-pod-network.99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.139900 env[1201]: 2025-09-06 01:24:56.002 [INFO][3737] cni-plugin/k8s.go 418: Populated endpoint ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b425bfaf-5f54-4b5c-88f3-3e0319345d4a", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"coredns-7c65d6cfc9-bbd56", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali783196fe312", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:56.139900 env[1201]: 2025-09-06 01:24:56.007 [INFO][3737] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.69/32] ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.139900 env[1201]: 2025-09-06 01:24:56.008 [INFO][3737] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali783196fe312 ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.139900 env[1201]: 2025-09-06 01:24:56.071 [INFO][3737] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.139900 env[1201]: 2025-09-06 01:24:56.071 [INFO][3737] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b425bfaf-5f54-4b5c-88f3-3e0319345d4a", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c", Pod:"coredns-7c65d6cfc9-bbd56", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali783196fe312", MAC:"f2:e0:24:f9:c8:46", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:56.139900 env[1201]: 2025-09-06 01:24:56.112 [INFO][3737] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-bbd56" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:24:56.153351 kernel: kauditd_printk_skb: 320 callbacks suppressed Sep 6 01:24:56.153506 kernel: audit: type=1400 audit(1757121896.150:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.164853 kernel: audit: type=1400 audit(1757121896.150:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.175814 kernel: audit: type=1400 audit(1757121896.150:1089): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.175999 kernel: audit: type=1400 audit(1757121896.150:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.194866 kernel: audit: type=1400 audit(1757121896.150:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.218798 kernel: audit: type=1400 audit(1757121896.150:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.219099 kernel: audit: type=1400 audit(1757121896.150:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.221659 env[1201]: time="2025-09-06T01:24:56.220968025Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:56.223343 env[1201]: time="2025-09-06T01:24:56.223218390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.233159 kernel: audit: type=1400 audit(1757121896.150:1094): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.233385 env[1201]: time="2025-09-06T01:24:56.223985505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:56.233385 env[1201]: time="2025-09-06T01:24:56.225216202Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c pid=3915 runtime=io.containerd.runc.v2 Sep 6 01:24:56.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.246387 kernel: audit: type=1400 audit(1757121896.150:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.246481 kernel: audit: type=1400 audit(1757121896.152:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.152000 audit: BPF prog-id=157 op=LOAD Sep 6 01:24:56.168000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.168000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3875 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636137633038373834363865323065396437623038653139646534 Sep 6 01:24:56.168000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.168000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3875 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636137633038373834363865323065396437623038653139646534 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit: BPF prog-id=158 op=LOAD Sep 6 01:24:56.174000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000215610 items=0 ppid=3875 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636137633038373834363865323065396437623038653139646534 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.174000 audit: BPF prog-id=159 op=LOAD Sep 6 01:24:56.174000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000215658 items=0 ppid=3875 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636137633038373834363865323065396437623038653139646534 Sep 6 01:24:56.174000 audit: BPF prog-id=159 op=UNLOAD Sep 6 01:24:56.175000 audit: BPF prog-id=158 op=UNLOAD Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.181000 audit: BPF prog-id=160 op=LOAD Sep 6 01:24:56.181000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000215a68 items=0 ppid=3875 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636137633038373834363865323065396437623038653139646534 Sep 6 01:24:56.291152 systemd[1]: run-containerd-runc-k8s.io-99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c-runc.jGxeuH.mount: Deactivated successfully. Sep 6 01:24:56.308001 systemd[1]: Started cri-containerd-99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c.scope. Sep 6 01:24:56.321849 systemd-networkd[1024]: calib8af1cfa93a: Link UP Sep 6 01:24:56.331175 systemd-networkd[1024]: calib8af1cfa93a: Gained carrier Sep 6 01:24:56.332164 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib8af1cfa93a: link becomes ready Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.382000 audit: BPF prog-id=161 op=LOAD Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3915 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939616332386131346631613134313261626166336134656264633265 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3915 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939616332386131346631613134313261626166336134656264633265 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.387000 audit: BPF prog-id=162 op=LOAD Sep 6 01:24:56.387000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003e08c0 items=0 ppid=3915 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939616332386131346631613134313261626166336134656264633265 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit: BPF prog-id=163 op=LOAD Sep 6 01:24:56.388000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003e0908 items=0 ppid=3915 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939616332386131346631613134313261626166336134656264633265 Sep 6 01:24:56.388000 audit: BPF prog-id=163 op=UNLOAD Sep 6 01:24:56.388000 audit: BPF prog-id=162 op=UNLOAD Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { perfmon } for pid=3927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit[3927]: AVC avc: denied { bpf } for pid=3927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.388000 audit: BPF prog-id=164 op=LOAD Sep 6 01:24:56.388000 audit[3927]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003e0d18 items=0 ppid=3915 pid=3927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939616332386131346631613134313261626166336134656264633265 Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.417 [INFO][3765] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0 goldmane-7988f88666- calico-system 5edf1e57-2883-47ef-ba53-454041fc8724 932 0 2025-09-06 01:24:23 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:7988f88666 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com goldmane-7988f88666-wwmbx eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calib8af1cfa93a [] [] }} ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.417 [INFO][3765] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.794 [INFO][3813] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" HandleID="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.795 [INFO][3813] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" HandleID="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032d260), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"goldmane-7988f88666-wwmbx", "timestamp":"2025-09-06 01:24:55.784869611 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.796 [INFO][3813] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.989 [INFO][3813] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:55.989 [INFO][3813] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.058 [INFO][3813] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.107 [INFO][3813] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.139 [INFO][3813] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.148 [INFO][3813] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.166 [INFO][3813] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.166 [INFO][3813] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.184 [INFO][3813] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2 Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.253 [INFO][3813] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.287 [INFO][3813] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.70/26] block=192.168.47.64/26 handle="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.287 [INFO][3813] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.70/26] handle="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.287 [INFO][3813] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:56.406670 env[1201]: 2025-09-06 01:24:56.287 [INFO][3813] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.70/26] IPv6=[] ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" HandleID="k8s-pod-network.849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.408082 env[1201]: 2025-09-06 01:24:56.299 [INFO][3765] cni-plugin/k8s.go 418: Populated endpoint ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"5edf1e57-2883-47ef-ba53-454041fc8724", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-7988f88666-wwmbx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.47.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calib8af1cfa93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:56.408082 env[1201]: 2025-09-06 01:24:56.299 [INFO][3765] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.70/32] ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.408082 env[1201]: 2025-09-06 01:24:56.299 [INFO][3765] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib8af1cfa93a ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.408082 env[1201]: 2025-09-06 01:24:56.331 [INFO][3765] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.408082 env[1201]: 2025-09-06 01:24:56.334 [INFO][3765] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"5edf1e57-2883-47ef-ba53-454041fc8724", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2", Pod:"goldmane-7988f88666-wwmbx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.47.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calib8af1cfa93a", MAC:"06:fe:1c:bf:df:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:56.408082 env[1201]: 2025-09-06 01:24:56.385 [INFO][3765] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2" Namespace="calico-system" Pod="goldmane-7988f88666-wwmbx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:24:56.458970 env[1201]: time="2025-09-06T01:24:56.458916625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-p8px4,Uid:47db2387-c90d-4f84-b7fe-e2c1c0ca0443,Namespace:kube-system,Attempt:1,} returns sandbox id \"1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617\"" Sep 6 01:24:56.488773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82aa25bb0ae: link becomes ready Sep 6 01:24:56.491825 systemd-networkd[1024]: cali82aa25bb0ae: Link UP Sep 6 01:24:56.492142 systemd-networkd[1024]: cali82aa25bb0ae: Gained carrier Sep 6 01:24:56.502822 env[1201]: time="2025-09-06T01:24:56.502752643Z" level=info msg="CreateContainer within sandbox \"1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 6 01:24:56.503447 env[1201]: time="2025-09-06T01:24:56.503410360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-bbd56,Uid:b425bfaf-5f54-4b5c-88f3-3e0319345d4a,Namespace:kube-system,Attempt:1,} returns sandbox id \"99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c\"" Sep 6 01:24:56.513635 env[1201]: time="2025-09-06T01:24:56.513523858Z" level=info msg="CreateContainer within sandbox \"99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.801 [INFO][3802] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.801 [INFO][3802] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" iface="eth0" netns="/var/run/netns/cni-3ec99a88-d2bb-f26f-4c13-d2ba171d7638" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.821 [INFO][3802] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" iface="eth0" netns="/var/run/netns/cni-3ec99a88-d2bb-f26f-4c13-d2ba171d7638" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.842 [INFO][3802] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" iface="eth0" netns="/var/run/netns/cni-3ec99a88-d2bb-f26f-4c13-d2ba171d7638" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.842 [INFO][3802] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.842 [INFO][3802] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.982 [INFO][3853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:55.985 [INFO][3853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:56.455 [INFO][3853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:56.506 [WARNING][3853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:56.507 [INFO][3853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:56.528 [INFO][3853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:56.556450 env[1201]: 2025-09-06 01:24:56.537 [INFO][3802] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:24:56.552661 systemd[1]: run-netns-cni\x2d3ec99a88\x2dd2bb\x2df26f\x2d4c13\x2dd2ba171d7638.mount: Deactivated successfully. Sep 6 01:24:56.561292 env[1201]: time="2025-09-06T01:24:56.556542132Z" level=info msg="TearDown network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" successfully" Sep 6 01:24:56.561292 env[1201]: time="2025-09-06T01:24:56.556596723Z" level=info msg="StopPodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" returns successfully" Sep 6 01:24:56.568757 env[1201]: time="2025-09-06T01:24:56.568145429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-tb2gx,Uid:422459a7-59fd-4062-8887-0e32646e6d6b,Namespace:calico-apiserver,Attempt:1,}" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:55.479 [INFO][3758] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0 calico-apiserver-7b796d556f- calico-apiserver a8875be0-eb58-442a-b36c-f99a81a461bf 933 0 2025-09-06 01:24:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b796d556f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com calico-apiserver-7b796d556f-ksp96 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali82aa25bb0ae [] [] }} ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:55.479 [INFO][3758] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:55.972 [INFO][3823] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" HandleID="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:55.972 [INFO][3823] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" HandleID="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024faf0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"calico-apiserver-7b796d556f-ksp96", "timestamp":"2025-09-06 01:24:55.97197238 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:55.972 [INFO][3823] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.288 [INFO][3823] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.288 [INFO][3823] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.358 [INFO][3823] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.381 [INFO][3823] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.402 [INFO][3823] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.408 [INFO][3823] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.415 [INFO][3823] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.415 [INFO][3823] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.424 [INFO][3823] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15 Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.437 [INFO][3823] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.454 [INFO][3823] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.71/26] block=192.168.47.64/26 handle="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.454 [INFO][3823] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.71/26] handle="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.454 [INFO][3823] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:56.582218 env[1201]: 2025-09-06 01:24:56.454 [INFO][3823] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.71/26] IPv6=[] ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" HandleID="k8s-pod-network.fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.583454 env[1201]: 2025-09-06 01:24:56.463 [INFO][3758] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8875be0-eb58-442a-b36c-f99a81a461bf", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-7b796d556f-ksp96", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82aa25bb0ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:56.583454 env[1201]: 2025-09-06 01:24:56.463 [INFO][3758] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.71/32] ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.583454 env[1201]: 2025-09-06 01:24:56.463 [INFO][3758] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali82aa25bb0ae ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.583454 env[1201]: 2025-09-06 01:24:56.489 [INFO][3758] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.583454 env[1201]: 2025-09-06 01:24:56.490 [INFO][3758] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8875be0-eb58-442a-b36c-f99a81a461bf", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15", Pod:"calico-apiserver-7b796d556f-ksp96", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82aa25bb0ae", MAC:"fe:f4:c2:0f:46:ff", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:56.583454 env[1201]: 2025-09-06 01:24:56.521 [INFO][3758] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-ksp96" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:24:56.625144 env[1201]: time="2025-09-06T01:24:56.611166180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:56.625144 env[1201]: time="2025-09-06T01:24:56.611212994Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:56.625144 env[1201]: time="2025-09-06T01:24:56.611241433Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:56.625144 env[1201]: time="2025-09-06T01:24:56.611446421Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2 pid=3979 runtime=io.containerd.runc.v2 Sep 6 01:24:56.691956 env[1201]: time="2025-09-06T01:24:56.691891646Z" level=info msg="CreateContainer within sandbox \"99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7b8b9661d6f842280247aff545800c7dce9fec61881eb559723285ce09ee860e\"" Sep 6 01:24:56.693826 env[1201]: time="2025-09-06T01:24:56.693589136Z" level=info msg="StartContainer for \"7b8b9661d6f842280247aff545800c7dce9fec61881eb559723285ce09ee860e\"" Sep 6 01:24:56.701629 systemd[1]: Started cri-containerd-849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2.scope. Sep 6 01:24:56.731086 env[1201]: time="2025-09-06T01:24:56.730964809Z" level=info msg="CreateContainer within sandbox \"1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"eb286bb4436e8f4194192112e2cd43ea037ff993d9821170154f557acc344c79\"" Sep 6 01:24:56.732500 env[1201]: time="2025-09-06T01:24:56.732461161Z" level=info msg="StartContainer for \"eb286bb4436e8f4194192112e2cd43ea037ff993d9821170154f557acc344c79\"" Sep 6 01:24:56.753254 env[1201]: time="2025-09-06T01:24:56.746702105Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:56.753254 env[1201]: time="2025-09-06T01:24:56.746767632Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:56.753254 env[1201]: time="2025-09-06T01:24:56.746783963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:56.753254 env[1201]: time="2025-09-06T01:24:56.746980720Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15 pid=4014 runtime=io.containerd.runc.v2 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.798000 audit: BPF prog-id=165 op=LOAD Sep 6 01:24:56.800000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.800000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3979 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393839366537373134633731383263376364303665396666656135 Sep 6 01:24:56.800000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.800000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3979 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393839366537373134633731383263376364303665396666656135 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.803000 audit: BPF prog-id=166 op=LOAD Sep 6 01:24:56.803000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000287a70 items=0 ppid=3979 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393839366537373134633731383263376364303665396666656135 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.804000 audit: BPF prog-id=167 op=LOAD Sep 6 01:24:56.804000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000287ab8 items=0 ppid=3979 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393839366537373134633731383263376364303665396666656135 Sep 6 01:24:56.805000 audit: BPF prog-id=167 op=UNLOAD Sep 6 01:24:56.805000 audit: BPF prog-id=166 op=UNLOAD Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.805000 audit: BPF prog-id=168 op=LOAD Sep 6 01:24:56.805000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000287ec8 items=0 ppid=3979 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393839366537373134633731383263376364303665396666656135 Sep 6 01:24:56.821959 systemd[1]: Started cri-containerd-fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15.scope. Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit: BPF prog-id=169 op=LOAD Sep 6 01:24:56.832000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbbdf5c40 a2=94 a3=1 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.832000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.832000 audit: BPF prog-id=169 op=UNLOAD Sep 6 01:24:56.832000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.832000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbbdf5d10 a2=50 a3=7ffcbbdf5df0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.832000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.884588 systemd[1]: Started cri-containerd-7b8b9661d6f842280247aff545800c7dce9fec61881eb559723285ce09ee860e.scope. Sep 6 01:24:56.903000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.903000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbbdf5c50 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.903000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.908000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.908000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbbdf5c80 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.908000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.908000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbbdf5b90 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.908000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.908000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbbdf5ca0 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.908000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.908000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbbdf5c80 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.911000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.911000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbbdf5c70 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.911000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.911000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbbdf5ca0 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.922678 systemd[1]: Started cri-containerd-eb286bb4436e8f4194192112e2cd43ea037ff993d9821170154f557acc344c79.scope. Sep 6 01:24:56.935000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.935000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbbdf5c80 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.935000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.935000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbbdf5ca0 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.935000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.935000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbbdf5c70 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.935000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.935000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbbdf5ce0 a2=28 a3=0 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.935000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbbdf5a90 a2=50 a3=1 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.955000 audit: BPF prog-id=170 op=LOAD Sep 6 01:24:56.955000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbbdf5a90 a2=94 a3=5 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.969000 audit: BPF prog-id=170 op=UNLOAD Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbbdf5b40 a2=50 a3=1 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.969000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcbbdf5c60 a2=4 a3=38 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.969000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.969000 audit[3733]: AVC avc: denied { confidentiality } for pid=3733 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:56.969000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbbdf5cb0 a2=94 a3=6 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.969000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.972000 audit[3733]: AVC avc: denied { confidentiality } for pid=3733 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:56.972000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbbdf5460 a2=94 a3=88 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.972000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.974000 audit[3733]: AVC avc: denied { confidentiality } for pid=3733 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:56.974000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbbdf5460 a2=94 a3=88 items=0 ppid=3418 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.974000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.985000 audit: BPF prog-id=171 op=LOAD Sep 6 01:24:56.986000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.986000 audit[4046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3915 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386239363631643666383432323830323437616666353435383030 Sep 6 01:24:56.987000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.987000 audit[4046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3915 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386239363631643666383432323830323437616666353435383030 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.989000 audit: BPF prog-id=172 op=LOAD Sep 6 01:24:56.989000 audit[4046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a9f90 items=0 ppid=3915 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386239363631643666383432323830323437616666353435383030 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.990000 audit: BPF prog-id=173 op=LOAD Sep 6 01:24:56.990000 audit[4046]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a9fd8 items=0 ppid=3915 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386239363631643666383432323830323437616666353435383030 Sep 6 01:24:56.991000 audit: BPF prog-id=173 op=UNLOAD Sep 6 01:24:56.991000 audit: BPF prog-id=172 op=UNLOAD Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { perfmon } for pid=4046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit[4046]: AVC avc: denied { bpf } for pid=4046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:56.992000 audit: BPF prog-id=174 op=LOAD Sep 6 01:24:56.992000 audit[4046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002ea3e8 items=0 ppid=3915 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:56.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386239363631643666383432323830323437616666353435383030 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.011000 audit: BPF prog-id=175 op=LOAD Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3875 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562323836626234343336653866343139343139323131326532636434 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3875 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562323836626234343336653866343139343139323131326532636434 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.016000 audit: BPF prog-id=176 op=LOAD Sep 6 01:24:57.016000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00033c190 items=0 ppid=3875 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562323836626234343336653866343139343139323131326532636434 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit: BPF prog-id=177 op=LOAD Sep 6 01:24:57.017000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00033c1d8 items=0 ppid=3875 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562323836626234343336653866343139343139323131326532636434 Sep 6 01:24:57.017000 audit: BPF prog-id=177 op=UNLOAD Sep 6 01:24:57.017000 audit: BPF prog-id=176 op=UNLOAD Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { perfmon } for pid=4049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit[4049]: AVC avc: denied { bpf } for pid=4049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.017000 audit: BPF prog-id=178 op=LOAD Sep 6 01:24:57.017000 audit[4049]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00033c5e8 items=0 ppid=3875 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562323836626234343336653866343139343139323131326532636434 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.056000 audit: BPF prog-id=179 op=LOAD Sep 6 01:24:57.058000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.058000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4014 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393963393631623535633431666132626362353930636265646333 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4014 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393963393631623535633431666132626362353930636265646333 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit: BPF prog-id=180 op=LOAD Sep 6 01:24:57.060000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000241f00 items=0 ppid=4014 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393963393631623535633431666132626362353930636265646333 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit: BPF prog-id=181 op=LOAD Sep 6 01:24:57.060000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000241f48 items=0 ppid=4014 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393963393631623535633431666132626362353930636265646333 Sep 6 01:24:57.060000 audit: BPF prog-id=181 op=UNLOAD Sep 6 01:24:57.060000 audit: BPF prog-id=180 op=UNLOAD Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { perfmon } for pid=4029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit[4029]: AVC avc: denied { bpf } for pid=4029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.060000 audit: BPF prog-id=182 op=LOAD Sep 6 01:24:57.060000 audit[4029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00033a358 items=0 ppid=4014 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393963393631623535633431666132626362353930636265646333 Sep 6 01:24:57.134771 env[1201]: time="2025-09-06T01:24:57.125896673Z" level=info msg="StartContainer for \"7b8b9661d6f842280247aff545800c7dce9fec61881eb559723285ce09ee860e\" returns successfully" Sep 6 01:24:57.145401 env[1201]: time="2025-09-06T01:24:57.145319261Z" level=info msg="StartContainer for \"eb286bb4436e8f4194192112e2cd43ea037ff993d9821170154f557acc344c79\" returns successfully" Sep 6 01:24:57.149405 env[1201]: time="2025-09-06T01:24:57.149342928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7988f88666-wwmbx,Uid:5edf1e57-2883-47ef-ba53-454041fc8724,Namespace:calico-system,Attempt:1,} returns sandbox id \"849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2\"" Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit: BPF prog-id=183 op=LOAD Sep 6 01:24:57.162000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9716a830 a2=98 a3=1999999999999999 items=0 ppid=3418 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.162000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:24:57.162000 audit: BPF prog-id=183 op=UNLOAD Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit: BPF prog-id=184 op=LOAD Sep 6 01:24:57.162000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9716a710 a2=94 a3=ffff items=0 ppid=3418 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.162000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:24:57.162000 audit: BPF prog-id=184 op=UNLOAD Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { perfmon } for pid=4136 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit[4136]: AVC avc: denied { bpf } for pid=4136 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.162000 audit: BPF prog-id=185 op=LOAD Sep 6 01:24:57.162000 audit[4136]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9716a750 a2=94 a3=7ffc9716a930 items=0 ppid=3418 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.162000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:24:57.163000 audit: BPF prog-id=185 op=UNLOAD Sep 6 01:24:57.271650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount249386837.mount: Deactivated successfully. Sep 6 01:24:57.286460 env[1201]: time="2025-09-06T01:24:57.286396128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-ksp96,Uid:a8875be0-eb58-442a-b36c-f99a81a461bf,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15\"" Sep 6 01:24:57.352000 audit[4088]: AVC avc: denied { getattr } for pid=4088 comm="coredns" path="cgroup:[4026532885]" dev="nsfs" ino=4026532885 scontext=system_u:system_r:svirt_lxc_net_t:s0:c103,c214 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 6 01:24:57.352000 audit[4088]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c5078 a3=0 items=0 ppid=3875 pid=4088 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c103,c214 key=(null) Sep 6 01:24:57.352000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 6 01:24:57.361000 audit[4081]: AVC avc: denied { getattr } for pid=4081 comm="coredns" path="cgroup:[4026532882]" dev="nsfs" ino=4026532882 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c647 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 6 01:24:57.361000 audit[4081]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a900 a2=c0004fa858 a3=0 items=0 ppid=3915 pid=4081 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c647 key=(null) Sep 6 01:24:57.361000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 6 01:24:57.411421 systemd-networkd[1024]: calic94e5d96f0b: Link UP Sep 6 01:24:57.429963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:24:57.434759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic94e5d96f0b: link becomes ready Sep 6 01:24:57.436333 systemd-networkd[1024]: calic94e5d96f0b: Gained carrier Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.035 [INFO][4038] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0 calico-apiserver-7b796d556f- calico-apiserver 422459a7-59fd-4062-8887-0e32646e6d6b 941 0 2025-09-06 01:24:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b796d556f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-bf5vc.gb1.brightbox.com calico-apiserver-7b796d556f-tb2gx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic94e5d96f0b [] [] }} ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.039 [INFO][4038] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.302 [INFO][4111] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" HandleID="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.303 [INFO][4111] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" HandleID="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005cb120), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-bf5vc.gb1.brightbox.com", "pod":"calico-apiserver-7b796d556f-tb2gx", "timestamp":"2025-09-06 01:24:57.30227138 +0000 UTC"}, Hostname:"srv-bf5vc.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.303 [INFO][4111] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.303 [INFO][4111] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.303 [INFO][4111] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-bf5vc.gb1.brightbox.com' Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.324 [INFO][4111] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.332 [INFO][4111] ipam/ipam.go 394: Looking up existing affinities for host host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.357 [INFO][4111] ipam/ipam.go 511: Trying affinity for 192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.360 [INFO][4111] ipam/ipam.go 158: Attempting to load block cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.369 [INFO][4111] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.47.64/26 host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.369 [INFO][4111] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.47.64/26 handle="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.372 [INFO][4111] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90 Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.380 [INFO][4111] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.47.64/26 handle="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.390 [INFO][4111] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.47.72/26] block=192.168.47.64/26 handle="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.390 [INFO][4111] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.47.72/26] handle="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" host="srv-bf5vc.gb1.brightbox.com" Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.390 [INFO][4111] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:24:57.483949 env[1201]: 2025-09-06 01:24:57.390 [INFO][4111] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.72/26] IPv6=[] ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" HandleID="k8s-pod-network.207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.485321 env[1201]: 2025-09-06 01:24:57.394 [INFO][4038] cni-plugin/k8s.go 418: Populated endpoint ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"422459a7-59fd-4062-8887-0e32646e6d6b", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-7b796d556f-tb2gx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic94e5d96f0b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:57.485321 env[1201]: 2025-09-06 01:24:57.394 [INFO][4038] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.47.72/32] ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.485321 env[1201]: 2025-09-06 01:24:57.394 [INFO][4038] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic94e5d96f0b ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.485321 env[1201]: 2025-09-06 01:24:57.420 [INFO][4038] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.485321 env[1201]: 2025-09-06 01:24:57.441 [INFO][4038] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"422459a7-59fd-4062-8887-0e32646e6d6b", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90", Pod:"calico-apiserver-7b796d556f-tb2gx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic94e5d96f0b", MAC:"ca:94:5b:44:2a:de", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:24:57.485321 env[1201]: 2025-09-06 01:24:57.478 [INFO][4038] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90" Namespace="calico-apiserver" Pod="calico-apiserver-7b796d556f-tb2gx" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:24:57.502996 systemd-networkd[1024]: cali493dab0a152: Gained IPv6LL Sep 6 01:24:57.599174 env[1201]: time="2025-09-06T01:24:57.599078289Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:24:57.599412 env[1201]: time="2025-09-06T01:24:57.599137806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:24:57.599412 env[1201]: time="2025-09-06T01:24:57.599155634Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:24:57.599730 env[1201]: time="2025-09-06T01:24:57.599672098Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90 pid=4170 runtime=io.containerd.runc.v2 Sep 6 01:24:57.664228 systemd-networkd[1024]: vxlan.calico: Link UP Sep 6 01:24:57.664242 systemd-networkd[1024]: vxlan.calico: Gained carrier Sep 6 01:24:57.723252 systemd[1]: Started cri-containerd-207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90.scope. Sep 6 01:24:57.745519 systemd[1]: run-containerd-runc-k8s.io-207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90-runc.Px8xdG.mount: Deactivated successfully. Sep 6 01:24:57.797506 kubelet[2009]: I0906 01:24:57.797306 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-bbd56" podStartSLOduration=50.797217429 podStartE2EDuration="50.797217429s" podCreationTimestamp="2025-09-06 01:24:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:24:57.79701017 +0000 UTC m=+54.958967114" watchObservedRunningTime="2025-09-06 01:24:57.797217429 +0000 UTC m=+54.959174321" Sep 6 01:24:57.820967 systemd-networkd[1024]: cali783196fe312: Gained IPv6LL Sep 6 01:24:57.872000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:57.872000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001048e10 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:57.872000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:57.875000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:57.875000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc3200 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:24:57.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.883000 audit: BPF prog-id=186 op=LOAD Sep 6 01:24:57.885000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.885000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4170 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376434356233373064666463663439653664643835636138343065 Sep 6 01:24:57.885000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.885000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4170 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376434356233373064666463663439653664643835636138343065 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.886000 audit: BPF prog-id=187 op=LOAD Sep 6 01:24:57.886000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000295a00 items=0 ppid=4170 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376434356233373064666463663439653664643835636138343065 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.887000 audit: BPF prog-id=188 op=LOAD Sep 6 01:24:57.887000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000295a48 items=0 ppid=4170 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376434356233373064666463663439653664643835636138343065 Sep 6 01:24:57.888000 audit: BPF prog-id=188 op=UNLOAD Sep 6 01:24:57.888000 audit: BPF prog-id=187 op=UNLOAD Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:57.888000 audit: BPF prog-id=189 op=LOAD Sep 6 01:24:57.888000 audit[4190]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000295e58 items=0 ppid=4170 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:57.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230376434356233373064666463663439653664643835636138343065 Sep 6 01:24:58.013006 systemd-networkd[1024]: calib8af1cfa93a: Gained IPv6LL Sep 6 01:24:58.125085 env[1201]: time="2025-09-06T01:24:58.125014181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b796d556f-tb2gx,Uid:422459a7-59fd-4062-8887-0e32646e6d6b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90\"" Sep 6 01:24:58.145000 audit[4216]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=4216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.145000 audit[4216]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffbc618950 a2=0 a3=7fffbc61893c items=0 ppid=2130 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.150000 audit[4216]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.150000 audit[4216]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffbc618950 a2=0 a3=0 items=0 ppid=2130 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.258000 audit[4223]: NETFILTER_CFG table=filter:103 family=2 entries=20 op=nft_register_rule pid=4223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.258000 audit[4223]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffedcc6db40 a2=0 a3=7ffedcc6db2c items=0 ppid=2130 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.266000 audit[4223]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:58.266000 audit[4223]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffedcc6db40 a2=0 a3=0 items=0 ppid=2130 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:58.337304 systemd-networkd[1024]: cali82aa25bb0ae: Gained IPv6LL Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.343000 audit: BPF prog-id=190 op=LOAD Sep 6 01:24:58.343000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd20ca6a10 a2=98 a3=20 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.343000 audit: BPF prog-id=190 op=UNLOAD Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit: BPF prog-id=191 op=LOAD Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd20ca6820 a2=94 a3=54428f items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit: BPF prog-id=191 op=UNLOAD Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit: BPF prog-id=192 op=LOAD Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd20ca6850 a2=94 a3=2 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit: BPF prog-id=192 op=UNLOAD Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd20ca6720 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd20ca6750 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd20ca6660 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd20ca6770 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd20ca6750 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd20ca6740 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd20ca6770 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd20ca6750 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd20ca6770 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd20ca6740 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd20ca67b0 a2=28 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.352000 audit: BPF prog-id=193 op=LOAD Sep 6 01:24:58.352000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd20ca6620 a2=94 a3=0 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.352000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.352000 audit: BPF prog-id=193 op=UNLOAD Sep 6 01:24:58.358000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.358000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd20ca6610 a2=50 a3=2800 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.358000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd20ca6610 a2=50 a3=2800 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.359000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit: BPF prog-id=194 op=LOAD Sep 6 01:24:58.359000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd20ca5e30 a2=94 a3=2 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.359000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.359000 audit: BPF prog-id=194 op=UNLOAD Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.359000 audit: BPF prog-id=195 op=LOAD Sep 6 01:24:58.359000 audit[4230]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd20ca5f30 a2=94 a3=30 items=0 ppid=3418 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.359000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.378000 audit: BPF prog-id=196 op=LOAD Sep 6 01:24:58.378000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd1ee6640 a2=98 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.378000 audit: BPF prog-id=196 op=UNLOAD Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit: BPF prog-id=197 op=LOAD Sep 6 01:24:58.388000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd1ee6430 a2=94 a3=54428f items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.388000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.388000 audit: BPF prog-id=197 op=UNLOAD Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.388000 audit: BPF prog-id=198 op=LOAD Sep 6 01:24:58.388000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd1ee6460 a2=94 a3=2 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.388000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.388000 audit: BPF prog-id=198 op=UNLOAD Sep 6 01:24:58.583969 systemd[1]: run-containerd-runc-k8s.io-de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567-runc.jFsLWw.mount: Deactivated successfully. Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.680000 audit: BPF prog-id=199 op=LOAD Sep 6 01:24:58.680000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd1ee6320 a2=94 a3=1 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.680000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.688000 audit: BPF prog-id=199 op=UNLOAD Sep 6 01:24:58.689000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.689000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffd1ee63f0 a2=50 a3=7fffd1ee64d0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.714000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.714000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd1ee6330 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.714000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd1ee6360 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd1ee6270 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd1ee6380 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd1ee6360 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd1ee6350 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd1ee6380 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd1ee6360 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd1ee6380 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd1ee6350 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.718000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.718000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd1ee63c0 a2=28 a3=0 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd1ee6170 a2=50 a3=1 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit: BPF prog-id=200 op=LOAD Sep 6 01:24:58.720000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd1ee6170 a2=94 a3=5 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.720000 audit: BPF prog-id=200 op=UNLOAD Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd1ee6220 a2=50 a3=1 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffd1ee6340 a2=4 a3=38 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.720000 audit[4232]: AVC avc: denied { confidentiality } for pid=4232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:58.720000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd1ee6390 a2=94 a3=6 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { confidentiality } for pid=4232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:58.727000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd1ee5b40 a2=94 a3=88 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.727000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { perfmon } for pid=4232 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.727000 audit[4232]: AVC avc: denied { confidentiality } for pid=4232 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:24:58.727000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd1ee5b40 a2=94 a3=88 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.727000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.730000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.730000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd1ee7570 a2=10 a3=f8f00800 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.732000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.732000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd1ee7410 a2=10 a3=3 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.732000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.732000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd1ee73b0 a2=10 a3=3 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.732000 audit[4232]: AVC avc: denied { bpf } for pid=4232 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:24:58.732000 audit[4232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd1ee73b0 a2=10 a3=7 items=0 ppid=3418 pid=4232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:58.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:24:58.777000 audit: BPF prog-id=195 op=UNLOAD Sep 6 01:24:58.783186 kubelet[2009]: I0906 01:24:58.782998 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-p8px4" podStartSLOduration=51.78297328 podStartE2EDuration="51.78297328s" podCreationTimestamp="2025-09-06 01:24:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:24:57.826390817 +0000 UTC m=+54.988347730" watchObservedRunningTime="2025-09-06 01:24:58.78297328 +0000 UTC m=+55.944930173" Sep 6 01:24:58.811000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:58.811000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009af5860 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:24:58.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:24:58.813000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:58.813000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009af58f0 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:24:58.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:24:58.817000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:58.817000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009bdaa20 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:24:58.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:24:58.829000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:58.829000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00d428a80 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:24:58.829000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:24:58.830000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:58.830000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009af5980 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:24:58.830000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:24:58.831000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:24:58.831000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00d428aa0 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:24:58.831000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:24:58.909065 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL Sep 6 01:24:58.909494 systemd-networkd[1024]: calic94e5d96f0b: Gained IPv6LL Sep 6 01:24:59.270000 audit[4300]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:59.270000 audit[4300]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffb6995fc0 a2=0 a3=7fffb6995fac items=0 ppid=3418 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.270000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:59.279000 audit[4295]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=4295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:59.279000 audit[4295]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffed15859b0 a2=0 a3=7ffed158599c items=0 ppid=3418 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:59.307000 audit[4296]: NETFILTER_CFG table=mangle:107 family=2 entries=16 op=nft_register_chain pid=4296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:59.307000 audit[4296]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc3d600130 a2=0 a3=7ffc3d60011c items=0 ppid=3418 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.307000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:59.324000 audit[4307]: NETFILTER_CFG table=filter:108 family=2 entries=17 op=nft_register_rule pid=4307 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:59.324000 audit[4307]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd56aacb00 a2=0 a3=7ffd56aacaec items=0 ppid=2130 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:59.343000 audit[4297]: NETFILTER_CFG table=filter:109 family=2 entries=315 op=nft_register_chain pid=4297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:24:59.343000 audit[4297]: SYSCALL arch=c000003e syscall=46 success=yes exit=187764 a0=3 a1=7ffdf55d3930 a2=0 a3=0 items=0 ppid=3418 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:24:59.355000 audit[4307]: NETFILTER_CFG table=nat:110 family=2 entries=47 op=nft_register_chain pid=4307 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:24:59.355000 audit[4307]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd56aacb00 a2=0 a3=7ffd56aacaec items=0 ppid=2130 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:24:59.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:24:59.995801 env[1201]: time="2025-09-06T01:24:59.995628730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:24:59.999577 env[1201]: time="2025-09-06T01:24:59.999524657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:00.002353 env[1201]: time="2025-09-06T01:25:00.002308129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:00.009251 env[1201]: time="2025-09-06T01:25:00.009185327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:00.009895 env[1201]: time="2025-09-06T01:25:00.009853910Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 6 01:25:00.089618 env[1201]: time="2025-09-06T01:25:00.089228368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 6 01:25:00.139790 env[1201]: time="2025-09-06T01:25:00.139622935Z" level=info msg="CreateContainer within sandbox \"9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 6 01:25:00.160291 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1591779829.mount: Deactivated successfully. Sep 6 01:25:00.164786 env[1201]: time="2025-09-06T01:25:00.164736411Z" level=info msg="CreateContainer within sandbox \"9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b9349943a27df94c19b08a0d3628210ec3c02f51748c979d6a8cb37d93f23d4a\"" Sep 6 01:25:00.167010 env[1201]: time="2025-09-06T01:25:00.166923333Z" level=info msg="StartContainer for \"b9349943a27df94c19b08a0d3628210ec3c02f51748c979d6a8cb37d93f23d4a\"" Sep 6 01:25:00.203166 systemd[1]: Started cri-containerd-b9349943a27df94c19b08a0d3628210ec3c02f51748c979d6a8cb37d93f23d4a.scope. Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.241000 audit: BPF prog-id=201 op=LOAD Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3312 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:00.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333439393433613237646639346331396230386130643336323832 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3312 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:00.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333439393433613237646639346331396230386130643336323832 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit: BPF prog-id=202 op=LOAD Sep 6 01:25:00.242000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fccd0 items=0 ppid=3312 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:00.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333439393433613237646639346331396230386130643336323832 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.242000 audit: BPF prog-id=203 op=LOAD Sep 6 01:25:00.242000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fcd18 items=0 ppid=3312 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:00.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333439393433613237646639346331396230386130643336323832 Sep 6 01:25:00.243000 audit: BPF prog-id=203 op=UNLOAD Sep 6 01:25:00.243000 audit: BPF prog-id=202 op=UNLOAD Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:00.243000 audit: BPF prog-id=204 op=LOAD Sep 6 01:25:00.243000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000fd128 items=0 ppid=3312 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:00.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239333439393433613237646639346331396230386130643336323832 Sep 6 01:25:00.295744 env[1201]: time="2025-09-06T01:25:00.295601885Z" level=info msg="StartContainer for \"b9349943a27df94c19b08a0d3628210ec3c02f51748c979d6a8cb37d93f23d4a\" returns successfully" Sep 6 01:25:00.768997 kubelet[2009]: I0906 01:25:00.768451 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-b66569c6-zkbvb" podStartSLOduration=29.022681012 podStartE2EDuration="36.768413441s" podCreationTimestamp="2025-09-06 01:24:24 +0000 UTC" firstStartedPulling="2025-09-06 01:24:52.290875563 +0000 UTC m=+49.452832452" lastFinishedPulling="2025-09-06 01:25:00.036607981 +0000 UTC m=+57.198564881" observedRunningTime="2025-09-06 01:25:00.767980603 +0000 UTC m=+57.929937515" watchObservedRunningTime="2025-09-06 01:25:00.768413441 +0000 UTC m=+57.930370338" Sep 6 01:25:01.903442 env[1201]: time="2025-09-06T01:25:01.903370866Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:01.907406 env[1201]: time="2025-09-06T01:25:01.907370265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:01.910889 env[1201]: time="2025-09-06T01:25:01.910854013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:01.914561 env[1201]: time="2025-09-06T01:25:01.914517082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:01.916860 env[1201]: time="2025-09-06T01:25:01.915955008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 6 01:25:01.929287 env[1201]: time="2025-09-06T01:25:01.929210204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 01:25:01.930993 env[1201]: time="2025-09-06T01:25:01.930946548Z" level=info msg="CreateContainer within sandbox \"0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 6 01:25:01.958580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3441942887.mount: Deactivated successfully. Sep 6 01:25:01.969166 env[1201]: time="2025-09-06T01:25:01.969116618Z" level=info msg="CreateContainer within sandbox \"0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"48a109e45175ce097d26c00bf411f79b395830604c67d0f6cc1a3b5943288a6b\"" Sep 6 01:25:01.970335 env[1201]: time="2025-09-06T01:25:01.970299710Z" level=info msg="StartContainer for \"48a109e45175ce097d26c00bf411f79b395830604c67d0f6cc1a3b5943288a6b\"" Sep 6 01:25:02.005921 systemd[1]: Started cri-containerd-48a109e45175ce097d26c00bf411f79b395830604c67d0f6cc1a3b5943288a6b.scope. Sep 6 01:25:02.072827 kernel: kauditd_printk_skb: 935 callbacks suppressed Sep 6 01:25:02.078303 kernel: audit: type=1400 audit(1757121902.058:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078400 kernel: audit: type=1400 audit(1757121902.058:1337): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.084773 kernel: audit: type=1400 audit(1757121902.058:1338): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.091818 kernel: audit: type=1400 audit(1757121902.058:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.098749 kernel: audit: type=1400 audit(1757121902.058:1340): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.105808 kernel: audit: type=1400 audit(1757121902.059:1341): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.111775 kernel: audit: type=1400 audit(1757121902.059:1342): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.122737 kernel: audit: type=1400 audit(1757121902.059:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.123353 systemd[1]: run-containerd-runc-k8s.io-48a109e45175ce097d26c00bf411f79b395830604c67d0f6cc1a3b5943288a6b-runc.3nE8ki.mount: Deactivated successfully. Sep 6 01:25:02.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.129754 kernel: audit: type=1400 audit(1757121902.059:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.136853 kernel: audit: type=1400 audit(1757121902.072:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.072000 audit: BPF prog-id=205 op=LOAD Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3445 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613130396534353137356365303937643236633030626634313166 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3445 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613130396534353137356365303937643236633030626634313166 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit: BPF prog-id=206 op=LOAD Sep 6 01:25:02.077000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009b230 items=0 ppid=3445 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613130396534353137356365303937643236633030626634313166 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.077000 audit: BPF prog-id=207 op=LOAD Sep 6 01:25:02.077000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009b278 items=0 ppid=3445 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:02.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613130396534353137356365303937643236633030626634313166 Sep 6 01:25:02.078000 audit: BPF prog-id=207 op=UNLOAD Sep 6 01:25:02.078000 audit: BPF prog-id=206 op=UNLOAD Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { perfmon } for pid=4387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit[4387]: AVC avc: denied { bpf } for pid=4387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:02.078000 audit: BPF prog-id=208 op=LOAD Sep 6 01:25:02.078000 audit[4387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009b688 items=0 ppid=3445 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:02.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613130396534353137356365303937643236633030626634313166 Sep 6 01:25:02.198767 env[1201]: time="2025-09-06T01:25:02.198517744Z" level=info msg="StartContainer for \"48a109e45175ce097d26c00bf411f79b395830604c67d0f6cc1a3b5943288a6b\" returns successfully" Sep 6 01:25:02.219000 audit[4399]: AVC avc: denied { search } for pid=4399 comm="nginx" name="crypto" dev="proc" ino=33529 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c700 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:25:02.219000 audit[4399]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f600900f728 a2=0 a3=0 items=0 ppid=3445 pid=4399 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c700 key=(null) Sep 6 01:25:02.219000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 6 01:25:03.115777 env[1201]: time="2025-09-06T01:25:03.115679378Z" level=info msg="StopPodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\"" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.320 [WARNING][4426] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.322 [INFO][4426] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.322 [INFO][4426] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" iface="eth0" netns="" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.322 [INFO][4426] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.322 [INFO][4426] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.560 [INFO][4434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.563 [INFO][4434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.564 [INFO][4434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.578 [WARNING][4434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.578 [INFO][4434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.580 [INFO][4434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:03.585492 env[1201]: 2025-09-06 01:25:03.582 [INFO][4426] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.588393 env[1201]: time="2025-09-06T01:25:03.585533532Z" level=info msg="TearDown network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" successfully" Sep 6 01:25:03.588393 env[1201]: time="2025-09-06T01:25:03.585577928Z" level=info msg="StopPodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" returns successfully" Sep 6 01:25:03.592434 env[1201]: time="2025-09-06T01:25:03.592338202Z" level=info msg="RemovePodSandbox for \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\"" Sep 6 01:25:03.592572 env[1201]: time="2025-09-06T01:25:03.592404623Z" level=info msg="Forcibly stopping sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\"" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.660 [WARNING][4450] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" WorkloadEndpoint="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.660 [INFO][4450] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.660 [INFO][4450] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" iface="eth0" netns="" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.660 [INFO][4450] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.660 [INFO][4450] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.711 [INFO][4457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.711 [INFO][4457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.711 [INFO][4457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.721 [WARNING][4457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.721 [INFO][4457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" HandleID="k8s-pod-network.256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Workload="srv--bf5vc.gb1.brightbox.com-k8s-whisker--7fdd886675--5k587-eth0" Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.723 [INFO][4457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:03.729364 env[1201]: 2025-09-06 01:25:03.726 [INFO][4450] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26" Sep 6 01:25:03.730273 env[1201]: time="2025-09-06T01:25:03.729406431Z" level=info msg="TearDown network for sandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" successfully" Sep 6 01:25:03.733933 env[1201]: time="2025-09-06T01:25:03.733880576Z" level=info msg="RemovePodSandbox \"256e013c8fc8f1d9be2c5d5bc0db9975fef3b6484455dcbff7a705b1f0679d26\" returns successfully" Sep 6 01:25:03.734684 env[1201]: time="2025-09-06T01:25:03.734617661Z" level=info msg="StopPodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\"" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.848 [WARNING][4472] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8875be0-eb58-442a-b36c-f99a81a461bf", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15", Pod:"calico-apiserver-7b796d556f-ksp96", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82aa25bb0ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.850 [INFO][4472] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.850 [INFO][4472] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" iface="eth0" netns="" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.850 [INFO][4472] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.850 [INFO][4472] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.955 [INFO][4479] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.956 [INFO][4479] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.956 [INFO][4479] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.965 [WARNING][4479] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.965 [INFO][4479] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.967 [INFO][4479] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:03.972361 env[1201]: 2025-09-06 01:25:03.970 [INFO][4472] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:03.974452 env[1201]: time="2025-09-06T01:25:03.972415830Z" level=info msg="TearDown network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" successfully" Sep 6 01:25:03.974452 env[1201]: time="2025-09-06T01:25:03.972472021Z" level=info msg="StopPodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" returns successfully" Sep 6 01:25:03.974452 env[1201]: time="2025-09-06T01:25:03.973568822Z" level=info msg="RemovePodSandbox for \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\"" Sep 6 01:25:03.974452 env[1201]: time="2025-09-06T01:25:03.973608850Z" level=info msg="Forcibly stopping sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\"" Sep 6 01:25:04.020912 env[1201]: time="2025-09-06T01:25:04.020850599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:04.022802 env[1201]: time="2025-09-06T01:25:04.022763296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:04.024813 env[1201]: time="2025-09-06T01:25:04.024778867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:04.027656 env[1201]: time="2025-09-06T01:25:04.027621223Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:04.028547 env[1201]: time="2025-09-06T01:25:04.028508734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 01:25:04.032316 env[1201]: time="2025-09-06T01:25:04.030496492Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 6 01:25:04.035692 env[1201]: time="2025-09-06T01:25:04.035626372Z" level=info msg="CreateContainer within sandbox \"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 01:25:04.067520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3159857811.mount: Deactivated successfully. Sep 6 01:25:04.074877 env[1201]: time="2025-09-06T01:25:04.074701593Z" level=info msg="CreateContainer within sandbox \"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"19398f183f2bd43824efd8f206d3a6af5337ecfd3009473c2aa3eae4303e28ca\"" Sep 6 01:25:04.076260 env[1201]: time="2025-09-06T01:25:04.076194081Z" level=info msg="StartContainer for \"19398f183f2bd43824efd8f206d3a6af5337ecfd3009473c2aa3eae4303e28ca\"" Sep 6 01:25:04.131830 systemd[1]: run-containerd-runc-k8s.io-19398f183f2bd43824efd8f206d3a6af5337ecfd3009473c2aa3eae4303e28ca-runc.nSLuOE.mount: Deactivated successfully. Sep 6 01:25:04.138577 systemd[1]: Started cri-containerd-19398f183f2bd43824efd8f206d3a6af5337ecfd3009473c2aa3eae4303e28ca.scope. Sep 6 01:25:04.185000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.185000 audit[4515]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f623ff1d988 items=0 ppid=3611 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:04.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139333938663138336632626434333832346566643866323036643361 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit: BPF prog-id=209 op=LOAD Sep 6 01:25:04.186000 audit[4515]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00010b6a8 items=0 ppid=3611 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:04.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139333938663138336632626434333832346566643866323036643361 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.186000 audit: BPF prog-id=210 op=LOAD Sep 6 01:25:04.186000 audit[4515]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00010b6f8 items=0 ppid=3611 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:04.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139333938663138336632626434333832346566643866323036643361 Sep 6 01:25:04.187000 audit: BPF prog-id=210 op=UNLOAD Sep 6 01:25:04.187000 audit: BPF prog-id=209 op=UNLOAD Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { perfmon } for pid=4515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit[4515]: AVC avc: denied { bpf } for pid=4515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:04.187000 audit: BPF prog-id=211 op=LOAD Sep 6 01:25:04.187000 audit[4515]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00010b788 items=0 ppid=3611 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:04.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139333938663138336632626434333832346566643866323036643361 Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.082 [WARNING][4496] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8875be0-eb58-442a-b36c-f99a81a461bf", ResourceVersion:"955", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15", Pod:"calico-apiserver-7b796d556f-ksp96", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82aa25bb0ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.083 [INFO][4496] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.083 [INFO][4496] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" iface="eth0" netns="" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.083 [INFO][4496] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.083 [INFO][4496] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.208 [INFO][4507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.208 [INFO][4507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.208 [INFO][4507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.217 [WARNING][4507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.217 [INFO][4507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" HandleID="k8s-pod-network.04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--ksp96-eth0" Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.219 [INFO][4507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.229448 env[1201]: 2025-09-06 01:25:04.221 [INFO][4496] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd" Sep 6 01:25:04.231975 env[1201]: time="2025-09-06T01:25:04.230895017Z" level=info msg="StartContainer for \"19398f183f2bd43824efd8f206d3a6af5337ecfd3009473c2aa3eae4303e28ca\" returns successfully" Sep 6 01:25:04.231975 env[1201]: time="2025-09-06T01:25:04.231281824Z" level=info msg="TearDown network for sandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" successfully" Sep 6 01:25:04.238771 env[1201]: time="2025-09-06T01:25:04.238675861Z" level=info msg="RemovePodSandbox \"04977aec357be62269a893a4314c3dd53c62191e82a2f51a86ce18c22bb40abd\" returns successfully" Sep 6 01:25:04.241476 env[1201]: time="2025-09-06T01:25:04.241440996Z" level=info msg="StopPodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\"" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.291 [WARNING][4551] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0", GenerateName:"calico-kube-controllers-b66569c6-", Namespace:"calico-system", SelfLink:"", UID:"68446d0a-14e3-4523-a08c-0c70cebecb91", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b66569c6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b", Pod:"calico-kube-controllers-b66569c6-zkbvb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.47.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliac5fce9843d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.292 [INFO][4551] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.292 [INFO][4551] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" iface="eth0" netns="" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.292 [INFO][4551] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.292 [INFO][4551] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.337 [INFO][4561] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.337 [INFO][4561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.337 [INFO][4561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.348 [WARNING][4561] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.348 [INFO][4561] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.350 [INFO][4561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.354813 env[1201]: 2025-09-06 01:25:04.352 [INFO][4551] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.355781 env[1201]: time="2025-09-06T01:25:04.354860532Z" level=info msg="TearDown network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" successfully" Sep 6 01:25:04.355781 env[1201]: time="2025-09-06T01:25:04.354904630Z" level=info msg="StopPodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" returns successfully" Sep 6 01:25:04.356445 env[1201]: time="2025-09-06T01:25:04.356398461Z" level=info msg="RemovePodSandbox for \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\"" Sep 6 01:25:04.356709 env[1201]: time="2025-09-06T01:25:04.356659935Z" level=info msg="Forcibly stopping sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\"" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.413 [WARNING][4580] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0", GenerateName:"calico-kube-controllers-b66569c6-", Namespace:"calico-system", SelfLink:"", UID:"68446d0a-14e3-4523-a08c-0c70cebecb91", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b66569c6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"9d11d6575c13d04a47ccecab3dcd335c7d9a940be828cca5e6b1783ec209b54b", Pod:"calico-kube-controllers-b66569c6-zkbvb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.47.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliac5fce9843d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.413 [INFO][4580] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.413 [INFO][4580] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" iface="eth0" netns="" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.413 [INFO][4580] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.413 [INFO][4580] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.444 [INFO][4589] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.444 [INFO][4589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.444 [INFO][4589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.454 [WARNING][4589] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.454 [INFO][4589] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" HandleID="k8s-pod-network.bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--kube--controllers--b66569c6--zkbvb-eth0" Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.456 [INFO][4589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.460462 env[1201]: 2025-09-06 01:25:04.458 [INFO][4580] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09" Sep 6 01:25:04.461847 env[1201]: time="2025-09-06T01:25:04.461180450Z" level=info msg="TearDown network for sandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" successfully" Sep 6 01:25:04.468870 env[1201]: time="2025-09-06T01:25:04.468809988Z" level=info msg="RemovePodSandbox \"bcc528cd90f3ddf6f2353aea21b88c5f70772754c4bc0fce1b355cb499dcec09\" returns successfully" Sep 6 01:25:04.469751 env[1201]: time="2025-09-06T01:25:04.469693349Z" level=info msg="StopPodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\"" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.527 [WARNING][4605] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b425bfaf-5f54-4b5c-88f3-3e0319345d4a", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c", Pod:"coredns-7c65d6cfc9-bbd56", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali783196fe312", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.527 [INFO][4605] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.527 [INFO][4605] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" iface="eth0" netns="" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.527 [INFO][4605] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.528 [INFO][4605] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.560 [INFO][4613] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.560 [INFO][4613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.560 [INFO][4613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.571 [WARNING][4613] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.571 [INFO][4613] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.573 [INFO][4613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.579238 env[1201]: 2025-09-06 01:25:04.575 [INFO][4605] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.581594 env[1201]: time="2025-09-06T01:25:04.579739847Z" level=info msg="TearDown network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" successfully" Sep 6 01:25:04.581594 env[1201]: time="2025-09-06T01:25:04.579787343Z" level=info msg="StopPodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" returns successfully" Sep 6 01:25:04.581594 env[1201]: time="2025-09-06T01:25:04.581036753Z" level=info msg="RemovePodSandbox for \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\"" Sep 6 01:25:04.581594 env[1201]: time="2025-09-06T01:25:04.581109155Z" level=info msg="Forcibly stopping sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\"" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.634 [WARNING][4627] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"b425bfaf-5f54-4b5c-88f3-3e0319345d4a", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"99ac28a14f1a1412abaf3a4ebdc2e4d21e8e16e36134258076d922a736dccc4c", Pod:"coredns-7c65d6cfc9-bbd56", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali783196fe312", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.634 [INFO][4627] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.634 [INFO][4627] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" iface="eth0" netns="" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.634 [INFO][4627] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.634 [INFO][4627] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.668 [INFO][4634] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.669 [INFO][4634] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.669 [INFO][4634] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.678 [WARNING][4634] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.678 [INFO][4634] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" HandleID="k8s-pod-network.8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--bbd56-eth0" Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.680 [INFO][4634] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.685488 env[1201]: 2025-09-06 01:25:04.683 [INFO][4627] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11" Sep 6 01:25:04.686397 env[1201]: time="2025-09-06T01:25:04.685533096Z" level=info msg="TearDown network for sandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" successfully" Sep 6 01:25:04.690228 env[1201]: time="2025-09-06T01:25:04.690165649Z" level=info msg="RemovePodSandbox \"8a413aec53a1cf9e346e6faae324991eb924b924d32ffbf2de281ef18679ec11\" returns successfully" Sep 6 01:25:04.690970 env[1201]: time="2025-09-06T01:25:04.690934609Z" level=info msg="StopPodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\"" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.743 [WARNING][4648] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"5edf1e57-2883-47ef-ba53-454041fc8724", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2", Pod:"goldmane-7988f88666-wwmbx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.47.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calib8af1cfa93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.743 [INFO][4648] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.743 [INFO][4648] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" iface="eth0" netns="" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.743 [INFO][4648] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.743 [INFO][4648] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.783 [INFO][4655] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.783 [INFO][4655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.784 [INFO][4655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.792 [WARNING][4655] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.793 [INFO][4655] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.794 [INFO][4655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.800770 env[1201]: 2025-09-06 01:25:04.797 [INFO][4648] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.800770 env[1201]: time="2025-09-06T01:25:04.800652966Z" level=info msg="TearDown network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" successfully" Sep 6 01:25:04.800770 env[1201]: time="2025-09-06T01:25:04.800687773Z" level=info msg="StopPodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" returns successfully" Sep 6 01:25:04.802895 env[1201]: time="2025-09-06T01:25:04.802358172Z" level=info msg="RemovePodSandbox for \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\"" Sep 6 01:25:04.802895 env[1201]: time="2025-09-06T01:25:04.802398206Z" level=info msg="Forcibly stopping sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\"" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.858 [WARNING][4671] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0", GenerateName:"goldmane-7988f88666-", Namespace:"calico-system", SelfLink:"", UID:"5edf1e57-2883-47ef-ba53-454041fc8724", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7988f88666", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2", Pod:"goldmane-7988f88666-wwmbx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.47.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calib8af1cfa93a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.858 [INFO][4671] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.859 [INFO][4671] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" iface="eth0" netns="" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.859 [INFO][4671] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.859 [INFO][4671] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.899 [INFO][4678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.899 [INFO][4678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.899 [INFO][4678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.908 [WARNING][4678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.908 [INFO][4678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" HandleID="k8s-pod-network.04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Workload="srv--bf5vc.gb1.brightbox.com-k8s-goldmane--7988f88666--wwmbx-eth0" Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.910 [INFO][4678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:04.915742 env[1201]: 2025-09-06 01:25:04.913 [INFO][4671] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d" Sep 6 01:25:04.918551 env[1201]: time="2025-09-06T01:25:04.915767989Z" level=info msg="TearDown network for sandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" successfully" Sep 6 01:25:04.921887 env[1201]: time="2025-09-06T01:25:04.921823922Z" level=info msg="RemovePodSandbox \"04e67a686a6883e9cade6d4a02396ccd16450f22ead33ccbc561ebd7058e132d\" returns successfully" Sep 6 01:25:04.926531 env[1201]: time="2025-09-06T01:25:04.926484802Z" level=info msg="StopPodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\"" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:04.979 [WARNING][4692] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"422459a7-59fd-4062-8887-0e32646e6d6b", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90", Pod:"calico-apiserver-7b796d556f-tb2gx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic94e5d96f0b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:04.980 [INFO][4692] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:04.980 [INFO][4692] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" iface="eth0" netns="" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:04.980 [INFO][4692] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:04.980 [INFO][4692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.013 [INFO][4699] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.014 [INFO][4699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.014 [INFO][4699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.024 [WARNING][4699] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.024 [INFO][4699] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.026 [INFO][4699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:05.036843 env[1201]: 2025-09-06 01:25:05.028 [INFO][4692] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.038372 env[1201]: time="2025-09-06T01:25:05.036881217Z" level=info msg="TearDown network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" successfully" Sep 6 01:25:05.038372 env[1201]: time="2025-09-06T01:25:05.036937206Z" level=info msg="StopPodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" returns successfully" Sep 6 01:25:05.038372 env[1201]: time="2025-09-06T01:25:05.038243950Z" level=info msg="RemovePodSandbox for \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\"" Sep 6 01:25:05.038372 env[1201]: time="2025-09-06T01:25:05.038283761Z" level=info msg="Forcibly stopping sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\"" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.103 [WARNING][4714] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0", GenerateName:"calico-apiserver-7b796d556f-", Namespace:"calico-apiserver", SelfLink:"", UID:"422459a7-59fd-4062-8887-0e32646e6d6b", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b796d556f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90", Pod:"calico-apiserver-7b796d556f-tb2gx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.47.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic94e5d96f0b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.103 [INFO][4714] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.103 [INFO][4714] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" iface="eth0" netns="" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.103 [INFO][4714] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.103 [INFO][4714] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.155 [INFO][4722] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.156 [INFO][4722] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.156 [INFO][4722] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.166 [WARNING][4722] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.166 [INFO][4722] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" HandleID="k8s-pod-network.33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Workload="srv--bf5vc.gb1.brightbox.com-k8s-calico--apiserver--7b796d556f--tb2gx-eth0" Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.169 [INFO][4722] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:05.179813 env[1201]: 2025-09-06 01:25:05.176 [INFO][4714] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa" Sep 6 01:25:05.179813 env[1201]: time="2025-09-06T01:25:05.178879770Z" level=info msg="TearDown network for sandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" successfully" Sep 6 01:25:05.191639 env[1201]: time="2025-09-06T01:25:05.191145054Z" level=info msg="RemovePodSandbox \"33c6020af1a1975550cb0302aadcf5e49f47afc8540d83ba0a1e4b4c09e6f9fa\" returns successfully" Sep 6 01:25:05.198155 env[1201]: time="2025-09-06T01:25:05.198109850Z" level=info msg="StopPodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\"" Sep 6 01:25:05.297000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:05.297000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003f6420 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:25:05.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:25:05.297000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:05.297000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003f6460 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:25:05.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:25:05.297000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:05.297000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a84b60 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:25:05.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:25:05.297000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:05.297000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a84ba0 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:25:05.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.302 [WARNING][4736] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"47db2387-c90d-4f84-b7fe-e2c1c0ca0443", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617", Pod:"coredns-7c65d6cfc9-p8px4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali493dab0a152", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.302 [INFO][4736] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.302 [INFO][4736] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" iface="eth0" netns="" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.302 [INFO][4736] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.302 [INFO][4736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.343 [INFO][4743] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.343 [INFO][4743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.343 [INFO][4743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.353 [WARNING][4743] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.353 [INFO][4743] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.355 [INFO][4743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:05.362895 env[1201]: 2025-09-06 01:25:05.359 [INFO][4736] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.364840 env[1201]: time="2025-09-06T01:25:05.364028210Z" level=info msg="TearDown network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" successfully" Sep 6 01:25:05.364840 env[1201]: time="2025-09-06T01:25:05.364078391Z" level=info msg="StopPodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" returns successfully" Sep 6 01:25:05.365193 env[1201]: time="2025-09-06T01:25:05.365158718Z" level=info msg="RemovePodSandbox for \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\"" Sep 6 01:25:05.365567 env[1201]: time="2025-09-06T01:25:05.365512782Z" level=info msg="Forcibly stopping sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\"" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.418 [WARNING][4757] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"47db2387-c90d-4f84-b7fe-e2c1c0ca0443", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"1aca7c0878468e20e9d7b08e19de468b6a8b59619d0603430da7a04e97a22617", Pod:"coredns-7c65d6cfc9-p8px4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.47.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali493dab0a152", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.418 [INFO][4757] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.418 [INFO][4757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" iface="eth0" netns="" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.418 [INFO][4757] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.418 [INFO][4757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.458 [INFO][4765] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.458 [INFO][4765] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.458 [INFO][4765] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.472 [WARNING][4765] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.472 [INFO][4765] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" HandleID="k8s-pod-network.ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Workload="srv--bf5vc.gb1.brightbox.com-k8s-coredns--7c65d6cfc9--p8px4-eth0" Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.475 [INFO][4765] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:05.479603 env[1201]: 2025-09-06 01:25:05.477 [INFO][4757] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531" Sep 6 01:25:05.481447 env[1201]: time="2025-09-06T01:25:05.479908809Z" level=info msg="TearDown network for sandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" successfully" Sep 6 01:25:05.486158 env[1201]: time="2025-09-06T01:25:05.486111402Z" level=info msg="RemovePodSandbox \"ab3aea1a8b3bd5d18487a0fb01b37714757c06edfc3a942b1b6855ba886aa531\" returns successfully" Sep 6 01:25:05.487136 env[1201]: time="2025-09-06T01:25:05.487102699Z" level=info msg="StopPodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\"" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.554 [WARNING][4780] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2508492e-0028-4e46-b00a-9f1d7bcf3f9b", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112", Pod:"csi-node-driver-f4kjd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid501eb1e15b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.554 [INFO][4780] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.554 [INFO][4780] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" iface="eth0" netns="" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.554 [INFO][4780] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.554 [INFO][4780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.631 [INFO][4787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.632 [INFO][4787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.632 [INFO][4787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.642 [WARNING][4787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.642 [INFO][4787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.644 [INFO][4787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:05.666992 env[1201]: 2025-09-06 01:25:05.651 [INFO][4780] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.667856 env[1201]: time="2025-09-06T01:25:05.667013678Z" level=info msg="TearDown network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" successfully" Sep 6 01:25:05.667856 env[1201]: time="2025-09-06T01:25:05.667077573Z" level=info msg="StopPodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" returns successfully" Sep 6 01:25:05.693896 env[1201]: time="2025-09-06T01:25:05.693831593Z" level=info msg="RemovePodSandbox for \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\"" Sep 6 01:25:05.694224 env[1201]: time="2025-09-06T01:25:05.694166508Z" level=info msg="Forcibly stopping sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\"" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.826 [WARNING][4803] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2508492e-0028-4e46-b00a-9f1d7bcf3f9b", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 24, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"856c6b598f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-bf5vc.gb1.brightbox.com", ContainerID:"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112", Pod:"csi-node-driver-f4kjd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid501eb1e15b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.826 [INFO][4803] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.827 [INFO][4803] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" iface="eth0" netns="" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.827 [INFO][4803] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.827 [INFO][4803] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.963 [INFO][4810] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.963 [INFO][4810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.963 [INFO][4810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.974 [WARNING][4810] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.974 [INFO][4810] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" HandleID="k8s-pod-network.cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Workload="srv--bf5vc.gb1.brightbox.com-k8s-csi--node--driver--f4kjd-eth0" Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.977 [INFO][4810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:25:05.994983 env[1201]: 2025-09-06 01:25:05.979 [INFO][4803] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1" Sep 6 01:25:05.996409 env[1201]: time="2025-09-06T01:25:05.995562019Z" level=info msg="TearDown network for sandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" successfully" Sep 6 01:25:06.000507 env[1201]: time="2025-09-06T01:25:06.000414156Z" level=info msg="RemovePodSandbox \"cd2da7c28c82cee0e604fb0cfbadf3f39ab66f29e908df703f6fc2baaf1396b1\" returns successfully" Sep 6 01:25:08.244713 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2690611803.mount: Deactivated successfully. Sep 6 01:25:08.707837 systemd[1]: run-containerd-runc-k8s.io-b9349943a27df94c19b08a0d3628210ec3c02f51748c979d6a8cb37d93f23d4a-runc.m3Fa8c.mount: Deactivated successfully. Sep 6 01:25:09.561098 env[1201]: time="2025-09-06T01:25:09.561028438Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:09.564882 env[1201]: time="2025-09-06T01:25:09.564844191Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:09.567928 env[1201]: time="2025-09-06T01:25:09.567894175Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:09.572933 env[1201]: time="2025-09-06T01:25:09.572890625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:09.573440 env[1201]: time="2025-09-06T01:25:09.573399499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 6 01:25:09.628596 env[1201]: time="2025-09-06T01:25:09.628536498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 6 01:25:09.698009 env[1201]: time="2025-09-06T01:25:09.697764294Z" level=info msg="CreateContainer within sandbox \"849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 6 01:25:09.719018 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount667434245.mount: Deactivated successfully. Sep 6 01:25:09.723741 env[1201]: time="2025-09-06T01:25:09.723529348Z" level=info msg="CreateContainer within sandbox \"849896e7714c7182c7cd06e9ffea57e5b012d5a5e6fad053ad36f8086823e7a2\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656\"" Sep 6 01:25:09.726154 env[1201]: time="2025-09-06T01:25:09.725110599Z" level=info msg="StartContainer for \"b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656\"" Sep 6 01:25:09.787545 systemd[1]: Started cri-containerd-b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656.scope. Sep 6 01:25:09.794634 systemd[1]: run-containerd-runc-k8s.io-b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656-runc.9mQdPL.mount: Deactivated successfully. Sep 6 01:25:09.832255 kernel: kauditd_printk_skb: 105 callbacks suppressed Sep 6 01:25:09.833206 kernel: audit: type=1400 audit(1757121909.823:1365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842754 kernel: audit: type=1400 audit(1757121909.823:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.861523 kernel: audit: type=1400 audit(1757121909.823:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.861626 kernel: audit: type=1400 audit(1757121909.823:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.875315 kernel: audit: type=1400 audit(1757121909.823:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.885958 kernel: audit: type=1400 audit(1757121909.823:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.886041 kernel: audit: type=1400 audit(1757121909.823:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.891162 kernel: audit: type=1400 audit(1757121909.823:1372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.891239 kernel: audit: type=1400 audit(1757121909.823:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.897745 kernel: audit: type=1400 audit(1757121909.835:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.835000 audit: BPF prog-id=212 op=LOAD Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3979 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:09.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386239316165383366663963643336653535386235353164313533 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3979 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:09.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386239316165383366663963643336653535386235353164313533 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit: BPF prog-id=213 op=LOAD Sep 6 01:25:09.842000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00038a370 items=0 ppid=3979 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:09.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386239316165383366663963643336653535386235353164313533 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit: BPF prog-id=214 op=LOAD Sep 6 01:25:09.842000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00038a3b8 items=0 ppid=3979 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:09.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386239316165383366663963643336653535386235353164313533 Sep 6 01:25:09.842000 audit: BPF prog-id=214 op=UNLOAD Sep 6 01:25:09.842000 audit: BPF prog-id=213 op=UNLOAD Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { perfmon } for pid=4854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit[4854]: AVC avc: denied { bpf } for pid=4854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:09.842000 audit: BPF prog-id=215 op=LOAD Sep 6 01:25:09.842000 audit[4854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00038a7c8 items=0 ppid=3979 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:09.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233386239316165383366663963643336653535386235353164313533 Sep 6 01:25:09.933869 env[1201]: time="2025-09-06T01:25:09.933771737Z" level=info msg="StartContainer for \"b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656\" returns successfully" Sep 6 01:25:10.134286 kubelet[2009]: I0906 01:25:10.130877 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-7988f88666-wwmbx" podStartSLOduration=34.663680397 podStartE2EDuration="47.104926272s" podCreationTimestamp="2025-09-06 01:24:23 +0000 UTC" firstStartedPulling="2025-09-06 01:24:57.15121573 +0000 UTC m=+54.313172616" lastFinishedPulling="2025-09-06 01:25:09.592461578 +0000 UTC m=+66.754418491" observedRunningTime="2025-09-06 01:25:10.091841215 +0000 UTC m=+67.253798137" watchObservedRunningTime="2025-09-06 01:25:10.104926272 +0000 UTC m=+67.266883165" Sep 6 01:25:10.197000 audit[4901]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=4901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:10.197000 audit[4901]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe3973d440 a2=0 a3=7ffe3973d42c items=0 ppid=2130 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:10.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:10.204000 audit[4901]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:10.204000 audit[4901]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3973d440 a2=0 a3=7ffe3973d42c items=0 ppid=2130 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:10.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:11.050130 systemd[1]: run-containerd-runc-k8s.io-b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656-runc.q52IrY.mount: Deactivated successfully. Sep 6 01:25:12.040570 systemd[1]: run-containerd-runc-k8s.io-b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656-runc.hOcA1F.mount: Deactivated successfully. Sep 6 01:25:14.910464 env[1201]: time="2025-09-06T01:25:14.910393670Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:14.912502 env[1201]: time="2025-09-06T01:25:14.912455588Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:14.914516 env[1201]: time="2025-09-06T01:25:14.914459992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:14.916318 env[1201]: time="2025-09-06T01:25:14.916269874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:14.917234 env[1201]: time="2025-09-06T01:25:14.917185733Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 6 01:25:14.919589 env[1201]: time="2025-09-06T01:25:14.918742038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 6 01:25:14.929212 env[1201]: time="2025-09-06T01:25:14.929110647Z" level=info msg="CreateContainer within sandbox \"fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 6 01:25:14.957359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2754928027.mount: Deactivated successfully. Sep 6 01:25:14.962609 env[1201]: time="2025-09-06T01:25:14.962554417Z" level=info msg="CreateContainer within sandbox \"fd99c961b55c41fa2bcb590cbedc34760b98c1f182f0da9d29c4938425cbfc15\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"88f2a6ebdca3ccccc51d14301acab1c235208452b1da903ee7a769250dd2244b\"" Sep 6 01:25:14.965807 env[1201]: time="2025-09-06T01:25:14.964552789Z" level=info msg="StartContainer for \"88f2a6ebdca3ccccc51d14301acab1c235208452b1da903ee7a769250dd2244b\"" Sep 6 01:25:15.013422 systemd[1]: run-containerd-runc-k8s.io-88f2a6ebdca3ccccc51d14301acab1c235208452b1da903ee7a769250dd2244b-runc.wjOx2M.mount: Deactivated successfully. Sep 6 01:25:15.021066 systemd[1]: Started cri-containerd-88f2a6ebdca3ccccc51d14301acab1c235208452b1da903ee7a769250dd2244b.scope. Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060465 kernel: kauditd_printk_skb: 53 callbacks suppressed Sep 6 01:25:15.060600 kernel: audit: type=1400 audit(1757121915.053:1385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065833 kernel: audit: type=1400 audit(1757121915.053:1386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.076515 kernel: audit: type=1400 audit(1757121915.053:1387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.076616 kernel: audit: type=1400 audit(1757121915.053:1388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.086595 kernel: audit: type=1400 audit(1757121915.053:1389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.097858 kernel: audit: type=1400 audit(1757121915.053:1390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.097936 kernel: audit: type=1400 audit(1757121915.053:1391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.121151 kernel: audit: type=1400 audit(1757121915.053:1392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.121952 kernel: audit: type=1400 audit(1757121915.053:1393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.122070 kernel: audit: type=1400 audit(1757121915.053:1394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.053000 audit: BPF prog-id=216 op=LOAD Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4014 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838663261366562646361336363636363353164313433303161636162 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4014 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838663261366562646361336363636363353164313433303161636162 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.060000 audit: BPF prog-id=217 op=LOAD Sep 6 01:25:15.060000 audit[4950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218380 items=0 ppid=4014 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838663261366562646361336363636363353164313433303161636162 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.064000 audit: BPF prog-id=218 op=LOAD Sep 6 01:25:15.064000 audit[4950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002183c8 items=0 ppid=4014 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838663261366562646361336363636363353164313433303161636162 Sep 6 01:25:15.064000 audit: BPF prog-id=218 op=UNLOAD Sep 6 01:25:15.064000 audit: BPF prog-id=217 op=UNLOAD Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.065000 audit: BPF prog-id=219 op=LOAD Sep 6 01:25:15.065000 audit[4950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002187d8 items=0 ppid=4014 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838663261366562646361336363636363353164313433303161636162 Sep 6 01:25:15.147507 env[1201]: time="2025-09-06T01:25:15.147461278Z" level=info msg="StartContainer for \"88f2a6ebdca3ccccc51d14301acab1c235208452b1da903ee7a769250dd2244b\" returns successfully" Sep 6 01:25:15.285876 env[1201]: time="2025-09-06T01:25:15.285796986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:15.288954 env[1201]: time="2025-09-06T01:25:15.288918626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:15.293281 env[1201]: time="2025-09-06T01:25:15.293242035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:15.309681 env[1201]: time="2025-09-06T01:25:15.309602246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:15.311178 env[1201]: time="2025-09-06T01:25:15.311123168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 6 01:25:15.316123 env[1201]: time="2025-09-06T01:25:15.316082067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 6 01:25:15.318541 env[1201]: time="2025-09-06T01:25:15.318500992Z" level=info msg="CreateContainer within sandbox \"207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 6 01:25:15.343800 env[1201]: time="2025-09-06T01:25:15.343744134Z" level=info msg="CreateContainer within sandbox \"207d45b370dfdcf49e6dd85ca840ed4b9173182c8aabdfec471ca0797c26ef90\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4a7916c350700588c6986c9ab4d1bf45d2afc97eb45c2056d8e2aaee83cfbee8\"" Sep 6 01:25:15.347179 env[1201]: time="2025-09-06T01:25:15.347141972Z" level=info msg="StartContainer for \"4a7916c350700588c6986c9ab4d1bf45d2afc97eb45c2056d8e2aaee83cfbee8\"" Sep 6 01:25:15.375265 systemd[1]: Started cri-containerd-4a7916c350700588c6986c9ab4d1bf45d2afc97eb45c2056d8e2aaee83cfbee8.scope. Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.413000 audit: BPF prog-id=220 op=LOAD Sep 6 01:25:15.414000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.414000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4170 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373931366333353037303035383863363938366339616234643162 Sep 6 01:25:15.414000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.414000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=4170 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373931366333353037303035383863363938366339616234643162 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.415000 audit: BPF prog-id=221 op=LOAD Sep 6 01:25:15.415000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000280ee0 items=0 ppid=4170 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373931366333353037303035383863363938366339616234643162 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit: BPF prog-id=222 op=LOAD Sep 6 01:25:15.416000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000280f28 items=0 ppid=4170 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373931366333353037303035383863363938366339616234643162 Sep 6 01:25:15.416000 audit: BPF prog-id=222 op=UNLOAD Sep 6 01:25:15.416000 audit: BPF prog-id=221 op=UNLOAD Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:15.416000 audit: BPF prog-id=223 op=LOAD Sep 6 01:25:15.416000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000281338 items=0 ppid=4170 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:15.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461373931366333353037303035383863363938366339616234643162 Sep 6 01:25:15.473660 env[1201]: time="2025-09-06T01:25:15.473604353Z" level=info msg="StartContainer for \"4a7916c350700588c6986c9ab4d1bf45d2afc97eb45c2056d8e2aaee83cfbee8\" returns successfully" Sep 6 01:25:16.080457 kubelet[2009]: I0906 01:25:16.080351 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b796d556f-tb2gx" podStartSLOduration=38.894151319 podStartE2EDuration="56.080308675s" podCreationTimestamp="2025-09-06 01:24:20 +0000 UTC" firstStartedPulling="2025-09-06 01:24:58.127038091 +0000 UTC m=+55.288994984" lastFinishedPulling="2025-09-06 01:25:15.31319544 +0000 UTC m=+72.475152340" observedRunningTime="2025-09-06 01:25:16.059543704 +0000 UTC m=+73.221500609" watchObservedRunningTime="2025-09-06 01:25:16.080308675 +0000 UTC m=+73.242265568" Sep 6 01:25:16.131000 audit[5019]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=5019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:16.131000 audit[5019]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe37d93fe0 a2=0 a3=7ffe37d93fcc items=0 ppid=2130 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:16.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:16.139000 audit[5019]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:16.139000 audit[5019]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe37d93fe0 a2=0 a3=7ffe37d93fcc items=0 ppid=2130 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:16.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:16.185000 audit[5021]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:16.185000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcf63ce440 a2=0 a3=7ffcf63ce42c items=0 ppid=2130 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:16.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:16.192000 audit[5021]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:16.192000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcf63ce440 a2=0 a3=7ffcf63ce42c items=0 ppid=2130 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:16.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:16.858000 audit[4959]: AVC avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_24_39.1237833596/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c672 tclass=file permissive=0 Sep 6 01:25:16.858000 audit[4959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ccef40 a2=fc6 a3=0 items=0 ppid=4014 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c672 key=(null) Sep 6 01:25:16.858000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:25:16.963369 kubelet[2009]: I0906 01:25:16.963281 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b796d556f-ksp96" podStartSLOduration=39.338066301 podStartE2EDuration="56.95426162s" podCreationTimestamp="2025-09-06 01:24:20 +0000 UTC" firstStartedPulling="2025-09-06 01:24:57.302192448 +0000 UTC m=+54.464149341" lastFinishedPulling="2025-09-06 01:25:14.918387759 +0000 UTC m=+72.080344660" observedRunningTime="2025-09-06 01:25:16.084040155 +0000 UTC m=+73.245997071" watchObservedRunningTime="2025-09-06 01:25:16.95426162 +0000 UTC m=+74.116218518" Sep 6 01:25:17.233000 audit[5024]: NETFILTER_CFG table=filter:117 family=2 entries=13 op=nft_register_rule pid=5024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:17.233000 audit[5024]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe9edeb9c0 a2=0 a3=7ffe9edeb9ac items=0 ppid=2130 pid=5024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:17.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:17.239000 audit[5024]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=5024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:17.239000 audit[5024]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe9edeb9c0 a2=0 a3=7ffe9edeb9ac items=0 ppid=2130 pid=5024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:17.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:17.313270 systemd[1]: run-containerd-runc-k8s.io-b9349943a27df94c19b08a0d3628210ec3c02f51748c979d6a8cb37d93f23d4a-runc.HORB1P.mount: Deactivated successfully. Sep 6 01:25:18.180149 kubelet[2009]: I0906 01:25:18.180103 2009 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:25:18.283000 audit[4998]: AVC avc: denied { watch } for pid=4998 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_24_39.1346746367/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c789 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c789 tclass=file permissive=0 Sep 6 01:25:18.283000 audit[4998]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b94640 a2=fc6 a3=0 items=0 ppid=4170 pid=4998 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c789 key=(null) Sep 6 01:25:18.283000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:25:18.380000 audit[5044]: NETFILTER_CFG table=filter:119 family=2 entries=12 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:18.380000 audit[5044]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc9b1fdd60 a2=0 a3=7ffc9b1fdd4c items=0 ppid=2130 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:18.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:18.386000 audit[5044]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:18.386000 audit[5044]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc9b1fdd60 a2=0 a3=7ffc9b1fdd4c items=0 ppid=2130 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:18.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:20.586951 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3501277629.mount: Deactivated successfully. Sep 6 01:25:20.618934 env[1201]: time="2025-09-06T01:25:20.618865376Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:20.623077 env[1201]: time="2025-09-06T01:25:20.623036817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:20.626652 env[1201]: time="2025-09-06T01:25:20.626602477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:20.630500 env[1201]: time="2025-09-06T01:25:20.630460788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:20.632679 env[1201]: time="2025-09-06T01:25:20.631693415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 6 01:25:20.640027 env[1201]: time="2025-09-06T01:25:20.639954763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 01:25:20.675172 env[1201]: time="2025-09-06T01:25:20.675099325Z" level=info msg="CreateContainer within sandbox \"0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 6 01:25:20.710256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1299947784.mount: Deactivated successfully. Sep 6 01:25:20.713346 env[1201]: time="2025-09-06T01:25:20.713292576Z" level=info msg="CreateContainer within sandbox \"0642483f2c710b6dcbfbdbad54ae7161f9321d54872728ba3541547aec88fcaf\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"2f63e297a94a732ae4c16bc2cb32831264399ddbeb0c043a27d29910b1ce470b\"" Sep 6 01:25:20.715391 env[1201]: time="2025-09-06T01:25:20.715352080Z" level=info msg="StartContainer for \"2f63e297a94a732ae4c16bc2cb32831264399ddbeb0c043a27d29910b1ce470b\"" Sep 6 01:25:20.772523 systemd[1]: Started cri-containerd-2f63e297a94a732ae4c16bc2cb32831264399ddbeb0c043a27d29910b1ce470b.scope. Sep 6 01:25:20.807092 kernel: kauditd_printk_skb: 134 callbacks suppressed Sep 6 01:25:20.818701 kernel: audit: type=1400 audit(1757121920.797:1431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.818841 kernel: audit: type=1400 audit(1757121920.797:1432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.818918 kernel: audit: type=1400 audit(1757121920.801:1433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.826787 kernel: audit: type=1400 audit(1757121920.801:1434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.837169 kernel: audit: type=1400 audit(1757121920.801:1435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.837280 kernel: audit: type=1400 audit(1757121920.801:1436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.842631 kernel: audit: type=1400 audit(1757121920.801:1437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.853499 kernel: audit: type=1400 audit(1757121920.801:1438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.853622 kernel: audit: type=1400 audit(1757121920.801:1439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.867831 kernel: audit: type=1400 audit(1757121920.806:1440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.806000 audit: BPF prog-id=224 op=LOAD Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3445 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:20.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266363365323937613934613733326165346331366263326362333238 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3445 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:20.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266363365323937613934613733326165346331366263326362333238 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.807000 audit: BPF prog-id=225 op=LOAD Sep 6 01:25:20.807000 audit[5059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a36e0 items=0 ppid=3445 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:20.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266363365323937613934613733326165346331366263326362333238 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit: BPF prog-id=226 op=LOAD Sep 6 01:25:20.812000 audit[5059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a3728 items=0 ppid=3445 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266363365323937613934613733326165346331366263326362333238 Sep 6 01:25:20.812000 audit: BPF prog-id=226 op=UNLOAD Sep 6 01:25:20.812000 audit: BPF prog-id=225 op=UNLOAD Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:20.812000 audit: BPF prog-id=227 op=LOAD Sep 6 01:25:20.812000 audit[5059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a3b38 items=0 ppid=3445 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266363365323937613934613733326165346331366263326362333238 Sep 6 01:25:20.889270 env[1201]: time="2025-09-06T01:25:20.889191306Z" level=info msg="StartContainer for \"2f63e297a94a732ae4c16bc2cb32831264399ddbeb0c043a27d29910b1ce470b\" returns successfully" Sep 6 01:25:21.259000 audit[5089]: NETFILTER_CFG table=filter:121 family=2 entries=11 op=nft_register_rule pid=5089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:21.259000 audit[5089]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc52a97a10 a2=0 a3=7ffc52a979fc items=0 ppid=2130 pid=5089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:21.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:21.265000 audit[5089]: NETFILTER_CFG table=nat:122 family=2 entries=29 op=nft_register_chain pid=5089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:21.265000 audit[5089]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffc52a97a10 a2=0 a3=7ffc52a979fc items=0 ppid=2130 pid=5089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:21.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:21.588019 systemd[1]: run-containerd-runc-k8s.io-2f63e297a94a732ae4c16bc2cb32831264399ddbeb0c043a27d29910b1ce470b-runc.WEfWJR.mount: Deactivated successfully. Sep 6 01:25:22.837757 env[1201]: time="2025-09-06T01:25:22.837638963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:22.842041 env[1201]: time="2025-09-06T01:25:22.841996707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:22.845868 env[1201]: time="2025-09-06T01:25:22.845834792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:22.848354 env[1201]: time="2025-09-06T01:25:22.848309081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 01:25:22.849486 env[1201]: time="2025-09-06T01:25:22.848618711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:25:22.853932 env[1201]: time="2025-09-06T01:25:22.853893284Z" level=info msg="CreateContainer within sandbox \"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 01:25:22.877528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount159147667.mount: Deactivated successfully. Sep 6 01:25:22.879636 env[1201]: time="2025-09-06T01:25:22.879576048Z" level=info msg="CreateContainer within sandbox \"c9b78a7a2f0ff5574fbc75c3158256bff1604757c6ad7a3bdd83b36349f06112\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0373ac7b910df501e8028886fbb95c8f9265a2cca9f50aeb7d2b336c1aa96a4a\"" Sep 6 01:25:22.880931 env[1201]: time="2025-09-06T01:25:22.880891840Z" level=info msg="StartContainer for \"0373ac7b910df501e8028886fbb95c8f9265a2cca9f50aeb7d2b336c1aa96a4a\"" Sep 6 01:25:22.935874 systemd[1]: run-containerd-runc-k8s.io-0373ac7b910df501e8028886fbb95c8f9265a2cca9f50aeb7d2b336c1aa96a4a-runc.glfoCI.mount: Deactivated successfully. Sep 6 01:25:22.947213 systemd[1]: Started cri-containerd-0373ac7b910df501e8028886fbb95c8f9265a2cca9f50aeb7d2b336c1aa96a4a.scope. Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f008c1bab58 items=0 ppid=3611 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:22.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033373361633762393130646635303165383032383838366662623935 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.995000 audit: BPF prog-id=228 op=LOAD Sep 6 01:25:22.995000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034bb98 items=0 ppid=3611 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:22.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033373361633762393130646635303165383032383838366662623935 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.996000 audit: BPF prog-id=229 op=LOAD Sep 6 01:25:22.996000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034bbe8 items=0 ppid=3611 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:22.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033373361633762393130646635303165383032383838366662623935 Sep 6 01:25:22.996000 audit: BPF prog-id=229 op=UNLOAD Sep 6 01:25:22.997000 audit: BPF prog-id=228 op=UNLOAD Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:25:22.997000 audit: BPF prog-id=230 op=LOAD Sep 6 01:25:22.997000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034bc78 items=0 ppid=3611 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:22.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033373361633762393130646635303165383032383838366662623935 Sep 6 01:25:23.057483 env[1201]: time="2025-09-06T01:25:23.056847844Z" level=info msg="StartContainer for \"0373ac7b910df501e8028886fbb95c8f9265a2cca9f50aeb7d2b336c1aa96a4a\" returns successfully" Sep 6 01:25:23.278597 kubelet[2009]: I0906 01:25:23.273030 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-f4kjd" podStartSLOduration=31.276145266 podStartE2EDuration="59.272999978s" podCreationTimestamp="2025-09-06 01:24:24 +0000 UTC" firstStartedPulling="2025-09-06 01:24:54.852702029 +0000 UTC m=+52.014658922" lastFinishedPulling="2025-09-06 01:25:22.849556741 +0000 UTC m=+80.011513634" observedRunningTime="2025-09-06 01:25:23.269786886 +0000 UTC m=+80.431743802" watchObservedRunningTime="2025-09-06 01:25:23.272999978 +0000 UTC m=+80.434956876" Sep 6 01:25:23.281248 kubelet[2009]: I0906 01:25:23.278973 2009 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-856c54478-cmxtz" podStartSLOduration=4.457668076 podStartE2EDuration="31.278949719s" podCreationTimestamp="2025-09-06 01:24:52 +0000 UTC" firstStartedPulling="2025-09-06 01:24:53.815312632 +0000 UTC m=+50.977269525" lastFinishedPulling="2025-09-06 01:25:20.636594255 +0000 UTC m=+77.798551168" observedRunningTime="2025-09-06 01:25:21.2143075 +0000 UTC m=+78.376264406" watchObservedRunningTime="2025-09-06 01:25:23.278949719 +0000 UTC m=+80.440906618" Sep 6 01:25:23.341571 kubelet[2009]: I0906 01:25:23.338128 2009 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 01:25:23.343834 kubelet[2009]: I0906 01:25:23.343794 2009 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 01:25:27.502888 systemd[1]: Started sshd@9-10.230.79.10:22-139.178.89.65:38876.service. Sep 6 01:25:27.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.79.10:22-139.178.89.65:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:27.518379 kernel: kauditd_printk_skb: 96 callbacks suppressed Sep 6 01:25:27.519501 kernel: audit: type=1130 audit(1757121927.510:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.79.10:22-139.178.89.65:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:28.488000 audit[5135]: USER_ACCT pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.496276 sshd[5135]: Accepted publickey for core from 139.178.89.65 port 38876 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:28.496899 kernel: audit: type=1101 audit(1757121928.488:1458): pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.498000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.515368 kernel: audit: type=1103 audit(1757121928.498:1459): pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.515508 kernel: audit: type=1006 audit(1757121928.498:1460): pid=5135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 6 01:25:28.513196 sshd[5135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:28.529334 kernel: audit: type=1300 audit(1757121928.498:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd523c0b0 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.529835 kernel: audit: type=1327 audit(1757121928.498:1460): proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:28.498000 audit[5135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd523c0b0 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:28.498000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:28.567021 systemd-logind[1190]: New session 10 of user core. Sep 6 01:25:28.572974 systemd[1]: Started session-10.scope. Sep 6 01:25:28.589000 audit[5135]: USER_START pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.599672 kernel: audit: type=1105 audit(1757121928.589:1461): pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.606000 audit[5145]: CRED_ACQ pid=5145 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:28.621145 kernel: audit: type=1103 audit(1757121928.606:1462): pid=5145 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:30.007320 sshd[5135]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:30.008000 audit[5135]: USER_END pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:30.023748 kernel: audit: type=1106 audit(1757121930.008:1463): pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:30.009000 audit[5135]: CRED_DISP pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:30.032857 kernel: audit: type=1104 audit(1757121930.009:1464): pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:30.033887 systemd[1]: sshd@9-10.230.79.10:22-139.178.89.65:38876.service: Deactivated successfully. Sep 6 01:25:30.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.79.10:22-139.178.89.65:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:30.038350 systemd[1]: session-10.scope: Deactivated successfully. Sep 6 01:25:30.039894 systemd-logind[1190]: Session 10 logged out. Waiting for processes to exit. Sep 6 01:25:30.044259 systemd-logind[1190]: Removed session 10. Sep 6 01:25:35.157817 systemd[1]: Started sshd@10-10.230.79.10:22-139.178.89.65:42944.service. Sep 6 01:25:35.169946 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 6 01:25:35.170196 kernel: audit: type=1130 audit(1757121935.157:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.79.10:22-139.178.89.65:42944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:35.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.79.10:22-139.178.89.65:42944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:36.128000 audit[5168]: USER_ACCT pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.130147 sshd[5168]: Accepted publickey for core from 139.178.89.65 port 42944 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:36.136752 kernel: audit: type=1101 audit(1757121936.128:1467): pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.137000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.157744 kernel: audit: type=1103 audit(1757121936.137:1468): pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.160509 sshd[5168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:36.137000 audit[5168]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec8e9dbc0 a2=3 a3=0 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:36.176014 kernel: audit: type=1006 audit(1757121936.137:1469): pid=5168 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Sep 6 01:25:36.183678 kernel: audit: type=1300 audit(1757121936.137:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec8e9dbc0 a2=3 a3=0 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:36.184642 kernel: audit: type=1327 audit(1757121936.137:1469): proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:36.137000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:36.181127 systemd[1]: Started session-11.scope. Sep 6 01:25:36.182044 systemd-logind[1190]: New session 11 of user core. Sep 6 01:25:36.193000 audit[5168]: USER_START pid=5168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.201000 audit[5170]: CRED_ACQ pid=5170 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.208663 kernel: audit: type=1105 audit(1757121936.193:1470): pid=5168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:36.208823 kernel: audit: type=1103 audit(1757121936.201:1471): pid=5170 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:37.245382 sshd[5168]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:37.250000 audit[5168]: USER_END pid=5168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:37.261090 systemd[1]: sshd@10-10.230.79.10:22-139.178.89.65:42944.service: Deactivated successfully. Sep 6 01:25:37.262476 systemd[1]: session-11.scope: Deactivated successfully. Sep 6 01:25:37.264762 kernel: audit: type=1106 audit(1757121937.250:1472): pid=5168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:37.265515 systemd-logind[1190]: Session 11 logged out. Waiting for processes to exit. Sep 6 01:25:37.257000 audit[5168]: CRED_DISP pid=5168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:37.274164 systemd-logind[1190]: Removed session 11. Sep 6 01:25:37.274886 kernel: audit: type=1104 audit(1757121937.257:1473): pid=5168 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:37.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.79.10:22-139.178.89.65:42944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:39.368000 audit[5223]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:39.368000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff1916c390 a2=0 a3=7fff1916c37c items=0 ppid=2130 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:39.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:39.376000 audit[5223]: NETFILTER_CFG table=nat:124 family=2 entries=31 op=nft_register_chain pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:25:39.376000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fff1916c390 a2=0 a3=7fff1916c37c items=0 ppid=2130 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:39.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:25:42.421465 systemd[1]: Started sshd@11-10.230.79.10:22-139.178.89.65:56330.service. Sep 6 01:25:42.431330 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 6 01:25:42.431694 kernel: audit: type=1130 audit(1757121942.421:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.79.10:22-139.178.89.65:56330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:42.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.79.10:22-139.178.89.65:56330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:43.474000 audit[5228]: USER_ACCT pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.482903 kernel: audit: type=1101 audit(1757121943.474:1478): pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.483179 sshd[5228]: Accepted publickey for core from 139.178.89.65 port 56330 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:43.485000 audit[5228]: CRED_ACQ pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.492734 kernel: audit: type=1103 audit(1757121943.485:1479): pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.496751 kernel: audit: type=1006 audit(1757121943.485:1480): pid=5228 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 6 01:25:43.496866 kernel: audit: type=1300 audit(1757121943.485:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6666a020 a2=3 a3=0 items=0 ppid=1 pid=5228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:43.485000 audit[5228]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6666a020 a2=3 a3=0 items=0 ppid=1 pid=5228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:43.485000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:43.505828 kernel: audit: type=1327 audit(1757121943.485:1480): proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:43.506072 sshd[5228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:43.521204 systemd[1]: Started session-12.scope. Sep 6 01:25:43.521828 systemd-logind[1190]: New session 12 of user core. Sep 6 01:25:43.528000 audit[5228]: USER_START pid=5228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.538411 kernel: audit: type=1105 audit(1757121943.528:1481): pid=5228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.538525 kernel: audit: type=1103 audit(1757121943.537:1482): pid=5230 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:43.537000 audit[5230]: CRED_ACQ pid=5230 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:44.805319 sshd[5228]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:44.806000 audit[5228]: USER_END pid=5228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:44.817826 kernel: audit: type=1106 audit(1757121944.806:1483): pid=5228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:44.821128 systemd[1]: sshd@11-10.230.79.10:22-139.178.89.65:56330.service: Deactivated successfully. Sep 6 01:25:44.823201 systemd[1]: session-12.scope: Deactivated successfully. Sep 6 01:25:44.823834 systemd-logind[1190]: Session 12 logged out. Waiting for processes to exit. Sep 6 01:25:44.806000 audit[5228]: CRED_DISP pid=5228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:44.831196 kernel: audit: type=1104 audit(1757121944.806:1484): pid=5228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:44.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.79.10:22-139.178.89.65:56330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:44.831635 systemd-logind[1190]: Removed session 12. Sep 6 01:25:44.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.79.10:22-139.178.89.65:56332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:44.951576 systemd[1]: Started sshd@12-10.230.79.10:22-139.178.89.65:56332.service. Sep 6 01:25:45.881000 audit[5241]: USER_ACCT pid=5241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:45.882388 sshd[5241]: Accepted publickey for core from 139.178.89.65 port 56332 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:45.883000 audit[5241]: CRED_ACQ pid=5241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:45.883000 audit[5241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec787dc70 a2=3 a3=0 items=0 ppid=1 pid=5241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:45.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:45.884804 sshd[5241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:45.892223 systemd-logind[1190]: New session 13 of user core. Sep 6 01:25:45.893829 systemd[1]: Started session-13.scope. Sep 6 01:25:45.901000 audit[5241]: USER_START pid=5241 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:45.904000 audit[5243]: CRED_ACQ pid=5243 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:46.847113 sshd[5241]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:46.850000 audit[5241]: USER_END pid=5241 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:46.851000 audit[5241]: CRED_DISP pid=5241 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:46.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.79.10:22-139.178.89.65:56332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:46.855423 systemd-logind[1190]: Session 13 logged out. Waiting for processes to exit. Sep 6 01:25:46.855777 systemd[1]: sshd@12-10.230.79.10:22-139.178.89.65:56332.service: Deactivated successfully. Sep 6 01:25:46.856955 systemd[1]: session-13.scope: Deactivated successfully. Sep 6 01:25:46.858494 systemd-logind[1190]: Removed session 13. Sep 6 01:25:46.996590 systemd[1]: Started sshd@13-10.230.79.10:22-139.178.89.65:56338.service. Sep 6 01:25:46.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.79.10:22-139.178.89.65:56338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:47.929000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.933638 sshd[5251]: Accepted publickey for core from 139.178.89.65 port 56338 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:47.934905 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 6 01:25:47.935306 kernel: audit: type=1101 audit(1757121947.929:1496): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.940000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.948405 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:47.948818 kernel: audit: type=1103 audit(1757121947.940:1497): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.949372 kernel: audit: type=1006 audit(1757121947.941:1498): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Sep 6 01:25:47.954781 kernel: audit: type=1300 audit(1757121947.941:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd7a3c520 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:47.941000 audit[5251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd7a3c520 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:47.941000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:47.962520 kernel: audit: type=1327 audit(1757121947.941:1498): proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:47.968800 systemd-logind[1190]: New session 14 of user core. Sep 6 01:25:47.970006 systemd[1]: Started session-14.scope. Sep 6 01:25:47.979000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.987000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.994297 kernel: audit: type=1105 audit(1757121947.979:1499): pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:47.994390 kernel: audit: type=1103 audit(1757121947.987:1500): pid=5253 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:48.726771 sshd[5251]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:48.729000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:48.734000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:48.743705 kernel: audit: type=1106 audit(1757121948.729:1501): pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:48.744173 kernel: audit: type=1104 audit(1757121948.734:1502): pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:48.744469 systemd[1]: sshd@13-10.230.79.10:22-139.178.89.65:56338.service: Deactivated successfully. Sep 6 01:25:48.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.79.10:22-139.178.89.65:56338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:48.756496 kernel: audit: type=1131 audit(1757121948.744:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.79.10:22-139.178.89.65:56338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:48.751360 systemd[1]: session-14.scope: Deactivated successfully. Sep 6 01:25:48.754928 systemd-logind[1190]: Session 14 logged out. Waiting for processes to exit. Sep 6 01:25:48.756636 systemd-logind[1190]: Removed session 14. Sep 6 01:25:53.882431 systemd[1]: Started sshd@14-10.230.79.10:22-139.178.89.65:49390.service. Sep 6 01:25:53.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.79.10:22-139.178.89.65:49390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:53.895769 kernel: audit: type=1130 audit(1757121953.883:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.79.10:22-139.178.89.65:49390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:54.869000 audit[5285]: USER_ACCT pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.883341 kernel: audit: type=1101 audit(1757121954.869:1505): pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.883913 sshd[5285]: Accepted publickey for core from 139.178.89.65 port 49390 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:25:54.897930 kernel: audit: type=1103 audit(1757121954.884:1506): pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.898334 kernel: audit: type=1006 audit(1757121954.884:1507): pid=5285 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Sep 6 01:25:54.898853 kernel: audit: type=1300 audit(1757121954.884:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd400e110 a2=3 a3=0 items=0 ppid=1 pid=5285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:54.884000 audit[5285]: CRED_ACQ pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.884000 audit[5285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd400e110 a2=3 a3=0 items=0 ppid=1 pid=5285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:25:54.886920 sshd[5285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:25:54.908744 kernel: audit: type=1327 audit(1757121954.884:1507): proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:54.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:25:54.910532 systemd[1]: Started session-15.scope. Sep 6 01:25:54.912524 systemd-logind[1190]: New session 15 of user core. Sep 6 01:25:54.921000 audit[5285]: USER_START pid=5285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.931334 kernel: audit: type=1105 audit(1757121954.921:1508): pid=5285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.931534 kernel: audit: type=1103 audit(1757121954.930:1509): pid=5287 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:54.930000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:56.160379 sshd[5285]: pam_unix(sshd:session): session closed for user core Sep 6 01:25:56.161000 audit[5285]: USER_END pid=5285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:56.177835 kernel: audit: type=1106 audit(1757121956.161:1510): pid=5285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:56.180682 kernel: audit: type=1104 audit(1757121956.161:1511): pid=5285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:56.161000 audit[5285]: CRED_DISP pid=5285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:25:56.177684 systemd[1]: sshd@14-10.230.79.10:22-139.178.89.65:49390.service: Deactivated successfully. Sep 6 01:25:56.179613 systemd[1]: session-15.scope: Deactivated successfully. Sep 6 01:25:56.185831 systemd-logind[1190]: Session 15 logged out. Waiting for processes to exit. Sep 6 01:25:56.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.79.10:22-139.178.89.65:49390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:25:56.187524 systemd-logind[1190]: Removed session 15. Sep 6 01:25:57.882000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:57.882000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:57.882000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d73050 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:25:57.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:25:57.882000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150ade0 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:25:57.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:25:58.548658 systemd[1]: run-containerd-runc-k8s.io-de765112463781533e49254912526e882bf0adbc9f097e8b85e72d162a67e567-runc.Lzajkz.mount: Deactivated successfully. Sep 6 01:25:58.839000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:58.839000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:58.839000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c011cff920 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:25:58.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:25:58.839000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c00d912090 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:25:58.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:25:58.841000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:58.841000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c00d9120c0 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:25:58.841000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:25:58.848000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:58.848000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c012ad2f20 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:25:58.848000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:25:58.851000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:58.851000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c011cffa70 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:25:58.851000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:25:58.852000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:25:58.852000 audit[1860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c012a78640 a2=fc6 a3=0 items=0 ppid=1716 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c403,c417 key=(null) Sep 6 01:25:58.852000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E37392E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 6 01:26:01.318071 systemd[1]: Started sshd@15-10.230.79.10:22-139.178.89.65:48784.service. Sep 6 01:26:01.335513 kernel: kauditd_printk_skb: 25 callbacks suppressed Sep 6 01:26:01.336403 kernel: audit: type=1130 audit(1757121961.319:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.79.10:22-139.178.89.65:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:01.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.79.10:22-139.178.89.65:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:02.339000 audit[5319]: USER_ACCT pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.354642 kernel: audit: type=1101 audit(1757121962.339:1522): pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.354781 kernel: audit: type=1103 audit(1757121962.346:1523): pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.346000 audit[5319]: CRED_ACQ pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.355672 sshd[5319]: Accepted publickey for core from 139.178.89.65 port 48784 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:02.367587 kernel: audit: type=1006 audit(1757121962.346:1524): pid=5319 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Sep 6 01:26:02.367703 kernel: audit: type=1300 audit(1757121962.346:1524): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc97428aa0 a2=3 a3=0 items=0 ppid=1 pid=5319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:02.346000 audit[5319]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc97428aa0 a2=3 a3=0 items=0 ppid=1 pid=5319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:02.374953 kernel: audit: type=1327 audit(1757121962.346:1524): proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:02.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:02.350019 sshd[5319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:02.360350 systemd[1]: Started session-16.scope. Sep 6 01:26:02.362553 systemd-logind[1190]: New session 16 of user core. Sep 6 01:26:02.393311 kernel: audit: type=1105 audit(1757121962.380:1525): pid=5319 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.380000 audit[5319]: USER_START pid=5319 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.396000 audit[5321]: CRED_ACQ pid=5321 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:02.404765 kernel: audit: type=1103 audit(1757121962.396:1526): pid=5321 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:03.988131 sshd[5319]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:03.989000 audit[5319]: USER_END pid=5319 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:03.989000 audit[5319]: CRED_DISP pid=5319 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:04.018690 kernel: audit: type=1106 audit(1757121963.989:1527): pid=5319 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:04.019576 kernel: audit: type=1104 audit(1757121963.989:1528): pid=5319 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:04.021001 systemd[1]: sshd@15-10.230.79.10:22-139.178.89.65:48784.service: Deactivated successfully. Sep 6 01:26:04.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.79.10:22-139.178.89.65:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:04.022995 systemd[1]: session-16.scope: Deactivated successfully. Sep 6 01:26:04.024236 systemd-logind[1190]: Session 16 logged out. Waiting for processes to exit. Sep 6 01:26:04.026169 systemd-logind[1190]: Removed session 16. Sep 6 01:26:05.302000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:26:05.302000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022a1b80 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:26:05.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:26:05.302000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:26:05.302000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00150bd80 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:26:05.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:26:05.312000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:26:05.312000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150bf40 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:26:05.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:26:05.312000 audit[1885]: AVC avc: denied { watch } for pid=1885 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:26:05.312000 audit[1885]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000af8340 a2=fc6 a3=0 items=0 ppid=1711 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c67,c974 key=(null) Sep 6 01:26:05.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:26:08.762318 systemd[1]: run-containerd-runc-k8s.io-b38b91ae83ff9cd36e558b551d153b5e98f1fb9a8a638b438626d19048c7f656-runc.S4YoZO.mount: Deactivated successfully. Sep 6 01:26:09.151727 systemd[1]: Started sshd@16-10.230.79.10:22-139.178.89.65:48796.service. Sep 6 01:26:09.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.79.10:22-139.178.89.65:48796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:09.155571 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 6 01:26:09.159954 kernel: audit: type=1130 audit(1757121969.152:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.79.10:22-139.178.89.65:48796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:10.135000 audit[5379]: USER_ACCT pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.142103 sshd[5379]: Accepted publickey for core from 139.178.89.65 port 48796 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:10.146773 kernel: audit: type=1101 audit(1757121970.135:1535): pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.146000 audit[5379]: CRED_ACQ pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.157432 kernel: audit: type=1103 audit(1757121970.146:1536): pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.157671 kernel: audit: type=1006 audit(1757121970.146:1537): pid=5379 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 6 01:26:10.157792 kernel: audit: type=1300 audit(1757121970.146:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda4c3b950 a2=3 a3=0 items=0 ppid=1 pid=5379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:10.146000 audit[5379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda4c3b950 a2=3 a3=0 items=0 ppid=1 pid=5379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:10.158839 sshd[5379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:10.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:10.167745 kernel: audit: type=1327 audit(1757121970.146:1537): proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:10.177813 systemd-logind[1190]: New session 17 of user core. Sep 6 01:26:10.178831 systemd[1]: Started session-17.scope. Sep 6 01:26:10.187000 audit[5379]: USER_START pid=5379 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.196410 kernel: audit: type=1105 audit(1757121970.187:1538): pid=5379 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.196528 kernel: audit: type=1103 audit(1757121970.192:1539): pid=5381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:10.192000 audit[5381]: CRED_ACQ pid=5381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:11.226094 sshd[5379]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:11.232000 audit[5379]: USER_END pid=5379 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:11.239000 audit[5379]: CRED_DISP pid=5379 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:11.242603 systemd[1]: sshd@16-10.230.79.10:22-139.178.89.65:48796.service: Deactivated successfully. Sep 6 01:26:11.244927 systemd[1]: session-17.scope: Deactivated successfully. Sep 6 01:26:11.246281 kernel: audit: type=1106 audit(1757121971.232:1540): pid=5379 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:11.246376 kernel: audit: type=1104 audit(1757121971.239:1541): pid=5379 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:11.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.79.10:22-139.178.89.65:48796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:11.247889 systemd-logind[1190]: Session 17 logged out. Waiting for processes to exit. Sep 6 01:26:11.253441 systemd-logind[1190]: Removed session 17. Sep 6 01:26:11.371356 systemd[1]: Started sshd@17-10.230.79.10:22-139.178.89.65:38156.service. Sep 6 01:26:11.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.79.10:22-139.178.89.65:38156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:12.285000 audit[5391]: USER_ACCT pid=5391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:12.287282 sshd[5391]: Accepted publickey for core from 139.178.89.65 port 38156 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:12.287000 audit[5391]: CRED_ACQ pid=5391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:12.287000 audit[5391]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd08065d40 a2=3 a3=0 items=0 ppid=1 pid=5391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:12.287000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:12.289842 sshd[5391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:12.297856 systemd-logind[1190]: New session 18 of user core. Sep 6 01:26:12.299552 systemd[1]: Started session-18.scope. Sep 6 01:26:12.307000 audit[5391]: USER_START pid=5391 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:12.309000 audit[5393]: CRED_ACQ pid=5393 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:13.349383 sshd[5391]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:13.353000 audit[5391]: USER_END pid=5391 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:13.354000 audit[5391]: CRED_DISP pid=5391 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:13.359109 systemd[1]: sshd@17-10.230.79.10:22-139.178.89.65:38156.service: Deactivated successfully. Sep 6 01:26:13.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.79.10:22-139.178.89.65:38156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:13.360206 systemd[1]: session-18.scope: Deactivated successfully. Sep 6 01:26:13.361836 systemd-logind[1190]: Session 18 logged out. Waiting for processes to exit. Sep 6 01:26:13.363837 systemd-logind[1190]: Removed session 18. Sep 6 01:26:13.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.79.10:22-139.178.89.65:38160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:13.497086 systemd[1]: Started sshd@18-10.230.79.10:22-139.178.89.65:38160.service. Sep 6 01:26:14.414000 audit[5401]: USER_ACCT pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.423390 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 6 01:26:14.423695 kernel: audit: type=1101 audit(1757121974.414:1553): pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.423791 sshd[5401]: Accepted publickey for core from 139.178.89.65 port 38160 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:14.428000 audit[5401]: CRED_ACQ pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.430160 sshd[5401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:14.435747 kernel: audit: type=1103 audit(1757121974.428:1554): pid=5401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.440741 kernel: audit: type=1006 audit(1757121974.428:1555): pid=5401 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Sep 6 01:26:14.445054 kernel: audit: type=1300 audit(1757121974.428:1555): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde517d090 a2=3 a3=0 items=0 ppid=1 pid=5401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:14.428000 audit[5401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde517d090 a2=3 a3=0 items=0 ppid=1 pid=5401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:14.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:14.449980 kernel: audit: type=1327 audit(1757121974.428:1555): proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:14.457662 systemd[1]: Started session-19.scope. Sep 6 01:26:14.460004 systemd-logind[1190]: New session 19 of user core. Sep 6 01:26:14.468000 audit[5401]: USER_START pid=5401 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.476000 audit[5403]: CRED_ACQ pid=5403 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.483587 kernel: audit: type=1105 audit(1757121974.468:1556): pid=5401 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:14.483873 kernel: audit: type=1103 audit(1757121974.476:1557): pid=5403 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:16.871000 audit[4959]: AVC avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_24_39.1237833596/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c672 tclass=file permissive=0 Sep 6 01:26:16.911136 kernel: audit: type=1400 audit(1757121976.871:1558): avc: denied { watch } for pid=4959 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_24_39.1237833596/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c122,c672 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c122,c672 tclass=file permissive=0 Sep 6 01:26:16.911799 kernel: audit: type=1300 audit(1757121976.871:1558): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0035af3a0 a2=fc6 a3=0 items=0 ppid=4014 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c672 key=(null) Sep 6 01:26:16.912641 kernel: audit: type=1327 audit(1757121976.871:1558): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:26:16.871000 audit[4959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0035af3a0 a2=fc6 a3=0 items=0 ppid=4014 pid=4959 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c122,c672 key=(null) Sep 6 01:26:16.871000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:26:18.291000 audit[4998]: AVC avc: denied { watch } for pid=4998 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_24_39.1346746367/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c789 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c789 tclass=file permissive=0 Sep 6 01:26:18.291000 audit[4998]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f1b100 a2=fc6 a3=0 items=0 ppid=4170 pid=4998 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c789 key=(null) Sep 6 01:26:18.291000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:26:18.802000 audit[5434]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.802000 audit[5434]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffde81986f0 a2=0 a3=7ffde81986dc items=0 ppid=2130 pid=5434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.802000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.812000 audit[5434]: NETFILTER_CFG table=nat:126 family=2 entries=26 op=nft_register_rule pid=5434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.812000 audit[5434]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffde81986f0 a2=0 a3=0 items=0 ppid=2130 pid=5434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.863000 audit[5436]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=5436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.863000 audit[5436]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd35934500 a2=0 a3=7ffd359344ec items=0 ppid=2130 pid=5436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.869000 audit[5436]: NETFILTER_CFG table=nat:128 family=2 entries=26 op=nft_register_rule pid=5436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:18.869000 audit[5436]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd35934500 a2=0 a3=0 items=0 ppid=2130 pid=5436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:18.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:18.903251 sshd[5401]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:18.975000 audit[5401]: USER_END pid=5401 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:18.976000 audit[5401]: CRED_DISP pid=5401 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:18.991153 systemd[1]: sshd@18-10.230.79.10:22-139.178.89.65:38160.service: Deactivated successfully. Sep 6 01:26:18.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.79.10:22-139.178.89.65:38160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:18.999549 systemd[1]: session-19.scope: Deactivated successfully. Sep 6 01:26:19.004241 systemd-logind[1190]: Session 19 logged out. Waiting for processes to exit. Sep 6 01:26:19.013759 systemd-logind[1190]: Removed session 19. Sep 6 01:26:19.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.79.10:22-139.178.89.65:38164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:19.057930 systemd[1]: Started sshd@19-10.230.79.10:22-139.178.89.65:38164.service. Sep 6 01:26:20.069000 audit[5439]: USER_ACCT pid=5439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.084692 kernel: kauditd_printk_skb: 19 callbacks suppressed Sep 6 01:26:20.086225 kernel: audit: type=1101 audit(1757121980.069:1568): pid=5439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.087421 kernel: audit: type=1103 audit(1757121980.085:1569): pid=5439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.085000 audit[5439]: CRED_ACQ pid=5439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.088975 sshd[5439]: Accepted publickey for core from 139.178.89.65 port 38164 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:20.090818 sshd[5439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:20.086000 audit[5439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85c470e0 a2=3 a3=0 items=0 ppid=1 pid=5439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:20.107354 kernel: audit: type=1006 audit(1757121980.086:1570): pid=5439 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Sep 6 01:26:20.107444 kernel: audit: type=1300 audit(1757121980.086:1570): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85c470e0 a2=3 a3=0 items=0 ppid=1 pid=5439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:20.107507 kernel: audit: type=1327 audit(1757121980.086:1570): proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:20.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:20.127556 systemd[1]: Started session-20.scope. Sep 6 01:26:20.128956 systemd-logind[1190]: New session 20 of user core. Sep 6 01:26:20.139000 audit[5439]: USER_START pid=5439 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.147771 kernel: audit: type=1105 audit(1757121980.139:1571): pid=5439 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.147000 audit[5449]: CRED_ACQ pid=5449 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:20.154742 kernel: audit: type=1103 audit(1757121980.147:1572): pid=5449 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:21.789616 sshd[5439]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:21.811000 audit[5439]: USER_END pid=5439 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:21.827291 kernel: audit: type=1106 audit(1757121981.811:1573): pid=5439 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:21.827800 kernel: audit: type=1104 audit(1757121981.826:1574): pid=5439 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:21.826000 audit[5439]: CRED_DISP pid=5439 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:21.845679 systemd[1]: sshd@19-10.230.79.10:22-139.178.89.65:38164.service: Deactivated successfully. Sep 6 01:26:21.854907 kernel: audit: type=1131 audit(1757121981.846:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.79.10:22-139.178.89.65:38164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:21.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.79.10:22-139.178.89.65:38164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:21.850194 systemd[1]: session-20.scope: Deactivated successfully. Sep 6 01:26:21.852176 systemd-logind[1190]: Session 20 logged out. Waiting for processes to exit. Sep 6 01:26:21.860644 systemd-logind[1190]: Removed session 20. Sep 6 01:26:21.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.79.10:22-139.178.89.65:42142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:21.951547 systemd[1]: Started sshd@20-10.230.79.10:22-139.178.89.65:42142.service. Sep 6 01:26:22.253198 update_engine[1191]: I0906 01:26:22.252332 1191 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 6 01:26:22.253198 update_engine[1191]: I0906 01:26:22.253240 1191 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 6 01:26:22.258676 update_engine[1191]: I0906 01:26:22.258620 1191 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 6 01:26:22.259963 update_engine[1191]: I0906 01:26:22.259938 1191 omaha_request_params.cc:62] Current group set to lts Sep 6 01:26:22.266940 update_engine[1191]: I0906 01:26:22.266832 1191 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 6 01:26:22.266940 update_engine[1191]: I0906 01:26:22.266853 1191 update_attempter.cc:643] Scheduling an action processor start. Sep 6 01:26:22.266940 update_engine[1191]: I0906 01:26:22.266888 1191 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 6 01:26:22.269289 update_engine[1191]: I0906 01:26:22.268371 1191 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 6 01:26:22.269289 update_engine[1191]: I0906 01:26:22.268486 1191 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 6 01:26:22.269289 update_engine[1191]: I0906 01:26:22.268499 1191 omaha_request_action.cc:271] Request: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: Sep 6 01:26:22.269289 update_engine[1191]: I0906 01:26:22.268507 1191 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 6 01:26:22.283617 update_engine[1191]: I0906 01:26:22.283445 1191 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 6 01:26:22.286129 update_engine[1191]: I0906 01:26:22.286062 1191 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 6 01:26:22.291655 update_engine[1191]: E0906 01:26:22.291487 1191 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 6 01:26:22.291655 update_engine[1191]: I0906 01:26:22.291618 1191 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 6 01:26:22.307503 locksmithd[1230]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 6 01:26:22.963000 audit[5458]: USER_ACCT pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:22.965683 sshd[5458]: Accepted publickey for core from 139.178.89.65 port 42142 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:22.966000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:22.966000 audit[5458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d1a92f0 a2=3 a3=0 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:22.966000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:22.968132 sshd[5458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:22.991869 systemd[1]: Started session-21.scope. Sep 6 01:26:22.992455 systemd-logind[1190]: New session 21 of user core. Sep 6 01:26:23.004000 audit[5458]: USER_START pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:23.007000 audit[5460]: CRED_ACQ pid=5460 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:24.156500 sshd[5458]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:24.159000 audit[5458]: USER_END pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:24.159000 audit[5458]: CRED_DISP pid=5458 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:24.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.79.10:22-139.178.89.65:42142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:24.163138 systemd[1]: sshd@20-10.230.79.10:22-139.178.89.65:42142.service: Deactivated successfully. Sep 6 01:26:24.164303 systemd[1]: session-21.scope: Deactivated successfully. Sep 6 01:26:24.165649 systemd-logind[1190]: Session 21 logged out. Waiting for processes to exit. Sep 6 01:26:24.167264 systemd-logind[1190]: Removed session 21. Sep 6 01:26:29.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.79.10:22-139.178.89.65:42154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:29.416205 kernel: kauditd_printk_skb: 11 callbacks suppressed Sep 6 01:26:29.422216 kernel: audit: type=1130 audit(1757121989.344:1585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.79.10:22-139.178.89.65:42154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:29.342948 systemd[1]: Started sshd@21-10.230.79.10:22-139.178.89.65:42154.service. Sep 6 01:26:30.210000 audit[5496]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=5496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:30.264276 kernel: audit: type=1325 audit(1757121990.210:1586): table=filter:129 family=2 entries=20 op=nft_register_rule pid=5496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:30.279477 kernel: audit: type=1300 audit(1757121990.210:1586): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe9f745090 a2=0 a3=7ffe9f74507c items=0 ppid=2130 pid=5496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:30.280238 kernel: audit: type=1327 audit(1757121990.210:1586): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:30.280300 kernel: audit: type=1325 audit(1757121990.251:1587): table=nat:130 family=2 entries=110 op=nft_register_chain pid=5496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:30.280351 kernel: audit: type=1300 audit(1757121990.251:1587): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffe9f745090 a2=0 a3=7ffe9f74507c items=0 ppid=2130 pid=5496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:30.280459 kernel: audit: type=1327 audit(1757121990.251:1587): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:30.210000 audit[5496]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe9f745090 a2=0 a3=7ffe9f74507c items=0 ppid=2130 pid=5496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:30.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:30.251000 audit[5496]: NETFILTER_CFG table=nat:130 family=2 entries=110 op=nft_register_chain pid=5496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:26:30.251000 audit[5496]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffe9f745090 a2=0 a3=7ffe9f74507c items=0 ppid=2130 pid=5496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:30.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:26:30.410993 sshd[5492]: Accepted publickey for core from 139.178.89.65 port 42154 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:30.422666 kernel: audit: type=1101 audit(1757121990.408:1588): pid=5492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:30.408000 audit[5492]: USER_ACCT pid=5492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:30.434000 audit[5492]: CRED_ACQ pid=5492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:30.447376 kernel: audit: type=1103 audit(1757121990.434:1589): pid=5492 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:30.447476 kernel: audit: type=1006 audit(1757121990.441:1590): pid=5492 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Sep 6 01:26:30.441000 audit[5492]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95e46ce0 a2=3 a3=0 items=0 ppid=1 pid=5492 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:30.441000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:30.450346 sshd[5492]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:30.516378 systemd-logind[1190]: New session 22 of user core. Sep 6 01:26:30.519510 systemd[1]: Started session-22.scope. Sep 6 01:26:30.546000 audit[5492]: USER_START pid=5492 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:30.553000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:32.266271 update_engine[1191]: I0906 01:26:32.261632 1191 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 6 01:26:32.325019 update_engine[1191]: I0906 01:26:32.290578 1191 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 6 01:26:32.325019 update_engine[1191]: I0906 01:26:32.299232 1191 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 6 01:26:32.325019 update_engine[1191]: E0906 01:26:32.304299 1191 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 6 01:26:32.325019 update_engine[1191]: I0906 01:26:32.304440 1191 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Sep 6 01:26:32.929902 sshd[5492]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:32.985000 audit[5492]: USER_END pid=5492 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:32.986000 audit[5492]: CRED_DISP pid=5492 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:33.007315 systemd[1]: sshd@21-10.230.79.10:22-139.178.89.65:42154.service: Deactivated successfully. Sep 6 01:26:33.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.79.10:22-139.178.89.65:42154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:33.014294 systemd[1]: session-22.scope: Deactivated successfully. Sep 6 01:26:33.019447 systemd-logind[1190]: Session 22 logged out. Waiting for processes to exit. Sep 6 01:26:33.038542 systemd-logind[1190]: Removed session 22. Sep 6 01:26:38.131111 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 6 01:26:38.157611 kernel: audit: type=1130 audit(1757121998.110:1596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.79.10:22-139.178.89.65:35278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:38.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.79.10:22-139.178.89.65:35278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:38.109646 systemd[1]: Started sshd@22-10.230.79.10:22-139.178.89.65:35278.service. Sep 6 01:26:39.206000 audit[5526]: USER_ACCT pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.277446 kernel: audit: type=1101 audit(1757121999.206:1597): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.279220 kernel: audit: type=1103 audit(1757121999.250:1598): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.279441 kernel: audit: type=1006 audit(1757121999.250:1599): pid=5526 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Sep 6 01:26:39.281350 kernel: audit: type=1300 audit(1757121999.250:1599): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee966fad0 a2=3 a3=0 items=0 ppid=1 pid=5526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:39.250000 audit[5526]: CRED_ACQ pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.285590 kernel: audit: type=1327 audit(1757121999.250:1599): proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:39.250000 audit[5526]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee966fad0 a2=3 a3=0 items=0 ppid=1 pid=5526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:26:39.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:26:39.295881 sshd[5526]: Accepted publickey for core from 139.178.89.65 port 35278 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 01:26:39.258399 sshd[5526]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:26:39.371402 systemd-logind[1190]: New session 23 of user core. Sep 6 01:26:39.374498 systemd[1]: Started session-23.scope. Sep 6 01:26:39.411871 kernel: audit: type=1105 audit(1757121999.394:1600): pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.394000 audit[5526]: USER_START pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.421754 kernel: audit: type=1103 audit(1757121999.406:1601): pid=5567 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:39.406000 audit[5567]: CRED_ACQ pid=5567 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:42.276986 update_engine[1191]: I0906 01:26:42.264245 1191 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 6 01:26:42.326328 update_engine[1191]: I0906 01:26:42.291033 1191 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 6 01:26:42.326328 update_engine[1191]: I0906 01:26:42.297075 1191 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 6 01:26:42.326328 update_engine[1191]: E0906 01:26:42.304009 1191 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 6 01:26:42.326328 update_engine[1191]: I0906 01:26:42.304147 1191 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Sep 6 01:26:52.091335 sshd[5526]: pam_unix(sshd:session): session closed for user core Sep 6 01:26:52.213466 kernel: audit: type=1106 audit(1757122012.165:1602): pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:52.214313 kernel: audit: type=1104 audit(1757122012.180:1603): pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:52.215480 kernel: audit: type=1131 audit(1757122012.189:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.79.10:22-139.178.89.65:35278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:52.165000 audit[5526]: USER_END pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:52.180000 audit[5526]: CRED_DISP pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:26:52.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.79.10:22-139.178.89.65:35278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:26:52.186114 systemd[1]: sshd@22-10.230.79.10:22-139.178.89.65:35278.service: Deactivated successfully. Sep 6 01:26:52.196325 systemd[1]: session-23.scope: Deactivated successfully. Sep 6 01:26:52.196604 systemd[1]: session-23.scope: Consumed 3.614s CPU time. Sep 6 01:26:52.214004 systemd-logind[1190]: Session 23 logged out. Waiting for processes to exit. Sep 6 01:26:52.225300 systemd-logind[1190]: Removed session 23. Sep 6 01:26:52.252641 update_engine[1191]: I0906 01:26:52.250360 1191 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 6 01:26:52.262983 update_engine[1191]: I0906 01:26:52.262778 1191 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 6 01:26:52.263470 update_engine[1191]: I0906 01:26:52.263411 1191 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 6 01:26:52.264105 update_engine[1191]: E0906 01:26:52.263851 1191 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 6 01:26:52.264105 update_engine[1191]: I0906 01:26:52.263962 1191 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 6 01:26:52.264105 update_engine[1191]: I0906 01:26:52.263973 1191 omaha_request_action.cc:621] Omaha request response: Sep 6 01:26:52.265557 update_engine[1191]: E0906 01:26:52.265349 1191 omaha_request_action.cc:640] Omaha request network transfer failed. Sep 6 01:26:52.265557 update_engine[1191]: I0906 01:26:52.265444 1191 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Sep 6 01:26:52.265557 update_engine[1191]: I0906 01:26:52.265476 1191 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 6 01:26:52.265557 update_engine[1191]: I0906 01:26:52.265486 1191 update_attempter.cc:306] Processing Done. Sep 6 01:26:52.266692 update_engine[1191]: E0906 01:26:52.266378 1191 update_attempter.cc:619] Update failed. Sep 6 01:26:52.266692 update_engine[1191]: I0906 01:26:52.266397 1191 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Sep 6 01:26:52.266692 update_engine[1191]: I0906 01:26:52.266404 1191 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Sep 6 01:26:52.266692 update_engine[1191]: I0906 01:26:52.266410 1191 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Sep 6 01:26:52.266692 update_engine[1191]: I0906 01:26:52.266605 1191 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 6 01:26:52.269683 update_engine[1191]: I0906 01:26:52.269109 1191 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 6 01:26:52.269683 update_engine[1191]: I0906 01:26:52.269129 1191 omaha_request_action.cc:271] Request: Sep 6 01:26:52.269683 update_engine[1191]: Sep 6 01:26:52.269683 update_engine[1191]: Sep 6 01:26:52.269683 update_engine[1191]: Sep 6 01:26:52.269683 update_engine[1191]: Sep 6 01:26:52.269683 update_engine[1191]: Sep 6 01:26:52.269683 update_engine[1191]: Sep 6 01:26:52.269683 update_engine[1191]: I0906 01:26:52.269145 1191 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 6 01:26:52.269683 update_engine[1191]: I0906 01:26:52.269411 1191 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 6 01:26:52.269683 update_engine[1191]: I0906 01:26:52.269623 1191 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 6 01:26:52.272287 update_engine[1191]: E0906 01:26:52.271575 1191 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272390 1191 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272409 1191 omaha_request_action.cc:621] Omaha request response: Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272418 1191 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272423 1191 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272428 1191 update_attempter.cc:306] Processing Done. Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272434 1191 update_attempter.cc:310] Error event sent. Sep 6 01:26:52.272571 update_engine[1191]: I0906 01:26:52.272457 1191 update_check_scheduler.cc:74] Next update check in 47m24s Sep 6 01:26:52.324778 locksmithd[1230]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Sep 6 01:26:52.326343 locksmithd[1230]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Sep 6 01:26:53.179076 kubelet[2009]: E0906 01:26:53.179000 2009 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="7.96s"