Sep 6 00:27:14.068058 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 00:27:14.068104 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:27:14.068125 kernel: BIOS-provided physical RAM map: Sep 6 00:27:14.068135 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 6 00:27:14.068145 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 6 00:27:14.068154 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 6 00:27:14.068166 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Sep 6 00:27:14.068176 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Sep 6 00:27:14.068186 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 6 00:27:14.068196 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Sep 6 00:27:14.068210 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 6 00:27:14.068220 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 6 00:27:14.068230 kernel: NX (Execute Disable) protection: active Sep 6 00:27:14.068241 kernel: SMBIOS 2.8 present. Sep 6 00:27:14.068253 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Sep 6 00:27:14.068264 kernel: Hypervisor detected: KVM Sep 6 00:27:14.068295 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 6 00:27:14.068307 kernel: kvm-clock: cpu 0, msr 1e19f001, primary cpu clock Sep 6 00:27:14.068318 kernel: kvm-clock: using sched offset of 6349798444 cycles Sep 6 00:27:14.068329 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 6 00:27:14.068341 kernel: tsc: Detected 2499.998 MHz processor Sep 6 00:27:14.068352 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 00:27:14.068376 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 00:27:14.068388 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Sep 6 00:27:14.068399 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 00:27:14.068416 kernel: Using GB pages for direct mapping Sep 6 00:27:14.068427 kernel: ACPI: Early table checksum verification disabled Sep 6 00:27:14.068437 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Sep 6 00:27:14.068448 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068459 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068470 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068481 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Sep 6 00:27:14.068492 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068503 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068518 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068529 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 00:27:14.068540 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Sep 6 00:27:14.068551 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Sep 6 00:27:14.068562 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Sep 6 00:27:14.068573 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Sep 6 00:27:14.068590 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Sep 6 00:27:14.068605 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Sep 6 00:27:14.068617 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Sep 6 00:27:14.068629 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 00:27:14.068640 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 00:27:14.068652 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 6 00:27:14.068663 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Sep 6 00:27:14.068675 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 6 00:27:14.068690 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Sep 6 00:27:14.068702 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 6 00:27:14.068713 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Sep 6 00:27:14.068725 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 6 00:27:14.068736 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Sep 6 00:27:14.068748 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 6 00:27:14.068759 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Sep 6 00:27:14.068770 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 6 00:27:14.068782 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Sep 6 00:27:14.068793 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 6 00:27:14.068809 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Sep 6 00:27:14.068820 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 6 00:27:14.068832 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 6 00:27:14.068844 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Sep 6 00:27:14.068855 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Sep 6 00:27:14.068867 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Sep 6 00:27:14.068879 kernel: Zone ranges: Sep 6 00:27:14.068890 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 00:27:14.068902 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Sep 6 00:27:14.068918 kernel: Normal empty Sep 6 00:27:14.068929 kernel: Movable zone start for each node Sep 6 00:27:14.068941 kernel: Early memory node ranges Sep 6 00:27:14.068952 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 6 00:27:14.068964 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Sep 6 00:27:14.068975 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Sep 6 00:27:14.068987 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 00:27:14.068998 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 6 00:27:14.069010 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Sep 6 00:27:14.069025 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 6 00:27:14.069037 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 6 00:27:14.069049 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 6 00:27:14.069060 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 6 00:27:14.069072 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 6 00:27:14.069083 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 00:27:14.069095 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 6 00:27:14.069106 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 6 00:27:14.069118 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 00:27:14.069133 kernel: TSC deadline timer available Sep 6 00:27:14.069145 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Sep 6 00:27:14.069156 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Sep 6 00:27:14.069168 kernel: Booting paravirtualized kernel on KVM Sep 6 00:27:14.069180 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 00:27:14.069192 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Sep 6 00:27:14.069203 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 6 00:27:14.069215 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 6 00:27:14.069227 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 6 00:27:14.069242 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Sep 6 00:27:14.069254 kernel: kvm-guest: PV spinlocks enabled Sep 6 00:27:14.069265 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 00:27:14.069288 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Sep 6 00:27:14.069322 kernel: Policy zone: DMA32 Sep 6 00:27:14.069336 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:27:14.069349 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 00:27:14.069370 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 00:27:14.069389 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 00:27:14.069401 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 00:27:14.069413 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 192524K reserved, 0K cma-reserved) Sep 6 00:27:14.069425 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 6 00:27:14.069437 kernel: Kernel/User page tables isolation: enabled Sep 6 00:27:14.069448 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 00:27:14.069460 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 00:27:14.069471 kernel: rcu: Hierarchical RCU implementation. Sep 6 00:27:14.069484 kernel: rcu: RCU event tracing is enabled. Sep 6 00:27:14.069499 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 6 00:27:14.069512 kernel: Rude variant of Tasks RCU enabled. Sep 6 00:27:14.069523 kernel: Tracing variant of Tasks RCU enabled. Sep 6 00:27:14.069535 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 00:27:14.069547 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 6 00:27:14.069558 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Sep 6 00:27:14.069570 kernel: random: crng init done Sep 6 00:27:14.069594 kernel: Console: colour VGA+ 80x25 Sep 6 00:27:14.069607 kernel: printk: console [tty0] enabled Sep 6 00:27:14.069619 kernel: printk: console [ttyS0] enabled Sep 6 00:27:14.069631 kernel: ACPI: Core revision 20210730 Sep 6 00:27:14.069643 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 00:27:14.069658 kernel: x2apic enabled Sep 6 00:27:14.069671 kernel: Switched APIC routing to physical x2apic. Sep 6 00:27:14.069683 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Sep 6 00:27:14.069696 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Sep 6 00:27:14.069708 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 6 00:27:14.069724 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 6 00:27:14.069737 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 6 00:27:14.069749 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 00:27:14.069761 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 00:27:14.069773 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 00:27:14.069785 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Sep 6 00:27:14.069797 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 6 00:27:14.069809 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 6 00:27:14.069821 kernel: MDS: Mitigation: Clear CPU buffers Sep 6 00:27:14.069833 kernel: MMIO Stale Data: Unknown: No mitigations Sep 6 00:27:14.069845 kernel: SRBDS: Unknown: Dependent on hypervisor status Sep 6 00:27:14.069861 kernel: active return thunk: its_return_thunk Sep 6 00:27:14.069873 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 00:27:14.069886 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 00:27:14.069898 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 00:27:14.069910 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 00:27:14.069922 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 00:27:14.069934 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 6 00:27:14.069946 kernel: Freeing SMP alternatives memory: 32K Sep 6 00:27:14.069958 kernel: pid_max: default: 32768 minimum: 301 Sep 6 00:27:14.069970 kernel: LSM: Security Framework initializing Sep 6 00:27:14.069982 kernel: SELinux: Initializing. Sep 6 00:27:14.069998 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 00:27:14.070010 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 00:27:14.070022 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Sep 6 00:27:14.070035 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Sep 6 00:27:14.070047 kernel: signal: max sigframe size: 1776 Sep 6 00:27:14.070059 kernel: rcu: Hierarchical SRCU implementation. Sep 6 00:27:14.070071 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 00:27:14.070083 kernel: smp: Bringing up secondary CPUs ... Sep 6 00:27:14.070096 kernel: x86: Booting SMP configuration: Sep 6 00:27:14.070108 kernel: .... node #0, CPUs: #1 Sep 6 00:27:14.070124 kernel: kvm-clock: cpu 1, msr 1e19f041, secondary cpu clock Sep 6 00:27:14.070136 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 6 00:27:14.070148 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Sep 6 00:27:14.070161 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 00:27:14.070173 kernel: smpboot: Max logical packages: 16 Sep 6 00:27:14.070185 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Sep 6 00:27:14.070197 kernel: devtmpfs: initialized Sep 6 00:27:14.070209 kernel: x86/mm: Memory block size: 128MB Sep 6 00:27:14.070221 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 00:27:14.070238 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 6 00:27:14.070250 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 00:27:14.070262 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 00:27:14.070289 kernel: audit: initializing netlink subsys (disabled) Sep 6 00:27:14.070304 kernel: audit: type=2000 audit(1757118432.750:1): state=initialized audit_enabled=0 res=1 Sep 6 00:27:14.070316 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 00:27:14.070328 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 00:27:14.070341 kernel: cpuidle: using governor menu Sep 6 00:27:14.070353 kernel: ACPI: bus type PCI registered Sep 6 00:27:14.070382 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 00:27:14.070395 kernel: dca service started, version 1.12.1 Sep 6 00:27:14.070407 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Sep 6 00:27:14.070420 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Sep 6 00:27:14.070432 kernel: PCI: Using configuration type 1 for base access Sep 6 00:27:14.070444 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 00:27:14.070456 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 00:27:14.070469 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 00:27:14.070481 kernel: ACPI: Added _OSI(Module Device) Sep 6 00:27:14.070497 kernel: ACPI: Added _OSI(Processor Device) Sep 6 00:27:14.070510 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 00:27:14.070522 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 00:27:14.070534 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 00:27:14.070546 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 00:27:14.070558 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 00:27:14.070570 kernel: ACPI: Interpreter enabled Sep 6 00:27:14.070582 kernel: ACPI: PM: (supports S0 S5) Sep 6 00:27:14.070594 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 00:27:14.070610 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 00:27:14.070623 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Sep 6 00:27:14.070635 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 6 00:27:14.070893 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 6 00:27:14.071064 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 6 00:27:14.071228 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 6 00:27:14.071247 kernel: PCI host bridge to bus 0000:00 Sep 6 00:27:14.071483 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 6 00:27:14.071635 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 6 00:27:14.071782 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 6 00:27:14.071929 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Sep 6 00:27:14.072076 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 6 00:27:14.072221 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Sep 6 00:27:14.072401 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 6 00:27:14.072616 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Sep 6 00:27:14.072816 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Sep 6 00:27:14.072981 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Sep 6 00:27:14.073154 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Sep 6 00:27:14.073341 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Sep 6 00:27:14.073530 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 6 00:27:14.073737 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.073915 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Sep 6 00:27:14.074137 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.076551 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Sep 6 00:27:14.076740 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.076906 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Sep 6 00:27:14.077101 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.077272 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Sep 6 00:27:14.077485 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.077648 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Sep 6 00:27:14.077827 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.077989 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Sep 6 00:27:14.078162 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.078348 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Sep 6 00:27:14.078543 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Sep 6 00:27:14.078707 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Sep 6 00:27:14.078893 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Sep 6 00:27:14.079056 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Sep 6 00:27:14.079235 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Sep 6 00:27:14.079442 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Sep 6 00:27:14.079605 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Sep 6 00:27:14.079790 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Sep 6 00:27:14.079954 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Sep 6 00:27:14.080117 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Sep 6 00:27:14.080304 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Sep 6 00:27:14.080509 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Sep 6 00:27:14.080679 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Sep 6 00:27:14.080874 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Sep 6 00:27:14.081051 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Sep 6 00:27:14.081225 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Sep 6 00:27:14.081450 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Sep 6 00:27:14.081627 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Sep 6 00:27:14.081832 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Sep 6 00:27:14.082023 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Sep 6 00:27:14.082201 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 00:27:14.082392 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 00:27:14.082568 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 00:27:14.082760 kernel: pci_bus 0000:02: extended config space not accessible Sep 6 00:27:14.082969 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Sep 6 00:27:14.083163 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Sep 6 00:27:14.094456 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 00:27:14.094661 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 00:27:14.094870 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Sep 6 00:27:14.095049 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Sep 6 00:27:14.095219 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 00:27:14.095463 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 00:27:14.095628 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 00:27:14.095820 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Sep 6 00:27:14.095993 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Sep 6 00:27:14.096159 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 00:27:14.096344 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 00:27:14.096523 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 00:27:14.096689 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 00:27:14.096858 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 00:27:14.097019 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 00:27:14.097184 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 00:27:14.097375 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 00:27:14.097544 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 00:27:14.097710 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 00:27:14.097873 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 00:27:14.098035 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 00:27:14.098209 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 00:27:14.098401 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 00:27:14.098569 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 00:27:14.098737 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 00:27:14.098902 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 00:27:14.099064 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 00:27:14.099084 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 6 00:27:14.099097 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 6 00:27:14.099116 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 6 00:27:14.099129 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 6 00:27:14.099142 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Sep 6 00:27:14.099154 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Sep 6 00:27:14.099167 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Sep 6 00:27:14.099179 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Sep 6 00:27:14.099192 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Sep 6 00:27:14.099204 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Sep 6 00:27:14.099217 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Sep 6 00:27:14.099233 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Sep 6 00:27:14.099246 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Sep 6 00:27:14.099259 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Sep 6 00:27:14.099271 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Sep 6 00:27:14.099304 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Sep 6 00:27:14.099317 kernel: iommu: Default domain type: Translated Sep 6 00:27:14.099330 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 00:27:14.099509 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Sep 6 00:27:14.099675 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 6 00:27:14.099846 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Sep 6 00:27:14.099866 kernel: vgaarb: loaded Sep 6 00:27:14.099879 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 00:27:14.099892 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 00:27:14.099904 kernel: PTP clock support registered Sep 6 00:27:14.099917 kernel: PCI: Using ACPI for IRQ routing Sep 6 00:27:14.099929 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 6 00:27:14.099942 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 6 00:27:14.099959 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Sep 6 00:27:14.099972 kernel: clocksource: Switched to clocksource kvm-clock Sep 6 00:27:14.099985 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 00:27:14.099998 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 00:27:14.100011 kernel: pnp: PnP ACPI init Sep 6 00:27:14.100210 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Sep 6 00:27:14.100232 kernel: pnp: PnP ACPI: found 5 devices Sep 6 00:27:14.100245 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 00:27:14.100258 kernel: NET: Registered PF_INET protocol family Sep 6 00:27:14.100289 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 00:27:14.100303 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 6 00:27:14.100317 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 00:27:14.100329 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 00:27:14.100342 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 6 00:27:14.100355 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 6 00:27:14.100379 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 00:27:14.100392 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 00:27:14.100410 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 00:27:14.100423 kernel: NET: Registered PF_XDP protocol family Sep 6 00:27:14.100592 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Sep 6 00:27:14.100760 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Sep 6 00:27:14.100928 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Sep 6 00:27:14.101093 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Sep 6 00:27:14.101260 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 6 00:27:14.101462 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 6 00:27:14.101629 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 6 00:27:14.101790 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 6 00:27:14.101954 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Sep 6 00:27:14.102118 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Sep 6 00:27:14.103921 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Sep 6 00:27:14.104125 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Sep 6 00:27:14.104316 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Sep 6 00:27:14.104507 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Sep 6 00:27:14.104686 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Sep 6 00:27:14.104861 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Sep 6 00:27:14.105048 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 00:27:14.105231 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 00:27:14.105435 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 00:27:14.105612 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Sep 6 00:27:14.105796 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 00:27:14.105967 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 00:27:14.106163 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 00:27:14.106354 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Sep 6 00:27:14.106544 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 00:27:14.106719 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 00:27:14.106895 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 00:27:14.107069 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Sep 6 00:27:14.107244 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 00:27:14.107443 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 00:27:14.107620 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 00:27:14.107796 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Sep 6 00:27:14.107970 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 00:27:14.108145 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 00:27:14.108356 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 00:27:14.108543 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Sep 6 00:27:14.108705 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 00:27:14.108866 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 00:27:14.109026 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 00:27:14.109187 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Sep 6 00:27:14.109393 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 00:27:14.109569 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 00:27:14.109747 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 00:27:14.109931 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Sep 6 00:27:14.110094 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 00:27:14.110269 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 00:27:14.110479 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 00:27:14.110658 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Sep 6 00:27:14.110841 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 00:27:14.111016 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 00:27:14.111186 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 6 00:27:14.111570 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 6 00:27:14.111720 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 6 00:27:14.111866 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Sep 6 00:27:14.112011 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Sep 6 00:27:14.112157 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Sep 6 00:27:14.112344 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Sep 6 00:27:14.112526 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Sep 6 00:27:14.112688 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 00:27:14.112857 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Sep 6 00:27:14.113026 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Sep 6 00:27:14.113182 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Sep 6 00:27:14.113354 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 00:27:14.113551 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Sep 6 00:27:14.113709 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Sep 6 00:27:14.113863 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 00:27:14.114028 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Sep 6 00:27:14.114184 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Sep 6 00:27:14.114356 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 00:27:14.114541 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Sep 6 00:27:14.114707 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Sep 6 00:27:14.114862 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 00:27:14.115039 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Sep 6 00:27:14.115198 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Sep 6 00:27:14.115381 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 00:27:14.115559 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Sep 6 00:27:14.115726 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Sep 6 00:27:14.115884 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 00:27:14.116051 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Sep 6 00:27:14.116209 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Sep 6 00:27:14.116397 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 00:27:14.116419 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Sep 6 00:27:14.116433 kernel: PCI: CLS 0 bytes, default 64 Sep 6 00:27:14.116446 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 00:27:14.116466 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Sep 6 00:27:14.116480 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 00:27:14.116494 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Sep 6 00:27:14.116507 kernel: Initialise system trusted keyrings Sep 6 00:27:14.116521 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 6 00:27:14.116534 kernel: Key type asymmetric registered Sep 6 00:27:14.116547 kernel: Asymmetric key parser 'x509' registered Sep 6 00:27:14.116560 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 00:27:14.116573 kernel: io scheduler mq-deadline registered Sep 6 00:27:14.116591 kernel: io scheduler kyber registered Sep 6 00:27:14.116605 kernel: io scheduler bfq registered Sep 6 00:27:14.116773 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Sep 6 00:27:14.116938 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Sep 6 00:27:14.117104 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.117271 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Sep 6 00:27:14.117466 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Sep 6 00:27:14.117640 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.117806 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Sep 6 00:27:14.117971 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Sep 6 00:27:14.118136 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.118316 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Sep 6 00:27:14.118499 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Sep 6 00:27:14.118672 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.118840 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Sep 6 00:27:14.119005 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Sep 6 00:27:14.119170 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.119351 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Sep 6 00:27:14.119534 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Sep 6 00:27:14.119703 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.119871 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Sep 6 00:27:14.120035 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Sep 6 00:27:14.120201 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.120397 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Sep 6 00:27:14.120564 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Sep 6 00:27:14.120737 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 00:27:14.120758 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 00:27:14.120773 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Sep 6 00:27:14.120786 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Sep 6 00:27:14.120800 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 00:27:14.120813 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 00:27:14.120827 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 6 00:27:14.120845 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 6 00:27:14.120863 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 6 00:27:14.121032 kernel: rtc_cmos 00:03: RTC can wake from S4 Sep 6 00:27:14.121054 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 6 00:27:14.121204 kernel: rtc_cmos 00:03: registered as rtc0 Sep 6 00:27:14.121416 kernel: rtc_cmos 00:03: setting system clock to 2025-09-06T00:27:13 UTC (1757118433) Sep 6 00:27:14.121570 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Sep 6 00:27:14.121590 kernel: intel_pstate: CPU model not supported Sep 6 00:27:14.121603 kernel: NET: Registered PF_INET6 protocol family Sep 6 00:27:14.121623 kernel: Segment Routing with IPv6 Sep 6 00:27:14.121636 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 00:27:14.121650 kernel: NET: Registered PF_PACKET protocol family Sep 6 00:27:14.121663 kernel: Key type dns_resolver registered Sep 6 00:27:14.121676 kernel: IPI shorthand broadcast: enabled Sep 6 00:27:14.121689 kernel: sched_clock: Marking stable (1052509736, 220698722)->(1613999527, -340791069) Sep 6 00:27:14.121703 kernel: registered taskstats version 1 Sep 6 00:27:14.121716 kernel: Loading compiled-in X.509 certificates Sep 6 00:27:14.121729 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 00:27:14.121746 kernel: Key type .fscrypt registered Sep 6 00:27:14.121759 kernel: Key type fscrypt-provisioning registered Sep 6 00:27:14.121773 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 00:27:14.121786 kernel: ima: Allocated hash algorithm: sha1 Sep 6 00:27:14.121799 kernel: ima: No architecture policies found Sep 6 00:27:14.121812 kernel: clk: Disabling unused clocks Sep 6 00:27:14.121825 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 00:27:14.121838 kernel: Write protecting the kernel read-only data: 28672k Sep 6 00:27:14.121856 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 00:27:14.121870 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 00:27:14.121883 kernel: Run /init as init process Sep 6 00:27:14.121896 kernel: with arguments: Sep 6 00:27:14.121909 kernel: /init Sep 6 00:27:14.121922 kernel: with environment: Sep 6 00:27:14.121935 kernel: HOME=/ Sep 6 00:27:14.121947 kernel: TERM=linux Sep 6 00:27:14.121960 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 00:27:14.121986 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:27:14.122010 systemd[1]: Detected virtualization kvm. Sep 6 00:27:14.122024 systemd[1]: Detected architecture x86-64. Sep 6 00:27:14.122038 systemd[1]: Running in initrd. Sep 6 00:27:14.122051 systemd[1]: No hostname configured, using default hostname. Sep 6 00:27:14.122065 systemd[1]: Hostname set to . Sep 6 00:27:14.122080 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:27:14.122094 systemd[1]: Queued start job for default target initrd.target. Sep 6 00:27:14.122112 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:27:14.122126 systemd[1]: Reached target cryptsetup.target. Sep 6 00:27:14.122140 systemd[1]: Reached target paths.target. Sep 6 00:27:14.122153 systemd[1]: Reached target slices.target. Sep 6 00:27:14.122167 systemd[1]: Reached target swap.target. Sep 6 00:27:14.122181 systemd[1]: Reached target timers.target. Sep 6 00:27:14.122196 systemd[1]: Listening on iscsid.socket. Sep 6 00:27:14.122213 systemd[1]: Listening on iscsiuio.socket. Sep 6 00:27:14.122228 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 00:27:14.122242 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 00:27:14.122256 systemd[1]: Listening on systemd-journald.socket. Sep 6 00:27:14.122270 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:27:14.122299 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:27:14.122313 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:27:14.122327 systemd[1]: Reached target sockets.target. Sep 6 00:27:14.122341 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:27:14.122370 systemd[1]: Finished network-cleanup.service. Sep 6 00:27:14.122387 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 00:27:14.122401 systemd[1]: Starting systemd-journald.service... Sep 6 00:27:14.122420 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:27:14.122434 systemd[1]: Starting systemd-resolved.service... Sep 6 00:27:14.122448 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 00:27:14.122462 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:27:14.122486 systemd-journald[202]: Journal started Sep 6 00:27:14.122569 systemd-journald[202]: Runtime Journal (/run/log/journal/a0a35a1fc39940c4b3a3e17c9260b124) is 4.7M, max 38.1M, 33.3M free. Sep 6 00:27:14.067009 systemd-modules-load[203]: Inserted module 'overlay' Sep 6 00:27:14.169054 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 00:27:14.169103 kernel: Bridge firewalling registered Sep 6 00:27:14.169123 kernel: audit: type=1130 audit(1757118434.161:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.169141 systemd[1]: Started systemd-resolved.service. Sep 6 00:27:14.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.090030 systemd-resolved[204]: Positive Trust Anchors: Sep 6 00:27:14.090050 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:27:14.178464 systemd[1]: Started systemd-journald.service. Sep 6 00:27:14.178500 kernel: audit: type=1130 audit(1757118434.171:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.090097 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:27:14.186791 kernel: audit: type=1130 audit(1757118434.179:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.094005 systemd-resolved[204]: Defaulting to hostname 'linux'. Sep 6 00:27:14.207661 kernel: audit: type=1130 audit(1757118434.190:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.207714 kernel: audit: type=1130 audit(1757118434.196:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.207734 kernel: SCSI subsystem initialized Sep 6 00:27:14.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.161974 systemd-modules-load[203]: Inserted module 'br_netfilter' Sep 6 00:27:14.179859 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 00:27:14.191143 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 00:27:14.196803 systemd[1]: Reached target nss-lookup.target. Sep 6 00:27:14.213586 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 00:27:14.216091 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:27:14.236320 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 00:27:14.236645 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 00:27:14.247138 kernel: device-mapper: uevent: version 1.0.3 Sep 6 00:27:14.247187 kernel: audit: type=1130 audit(1757118434.237:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.247208 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 00:27:14.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.237632 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:27:14.259936 kernel: audit: type=1130 audit(1757118434.248:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.250504 systemd[1]: Starting dracut-cmdline.service... Sep 6 00:27:14.271308 dracut-cmdline[219]: dracut-dracut-053 Sep 6 00:27:14.281431 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 00:27:14.399720 systemd-modules-load[203]: Inserted module 'dm_multipath' Sep 6 00:27:14.400691 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:27:14.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.402447 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:27:14.424102 kernel: audit: type=1130 audit(1757118434.401:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.435660 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:27:14.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.443349 kernel: audit: type=1130 audit(1757118434.436:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.459414 kernel: Loading iSCSI transport class v2.0-870. Sep 6 00:27:14.483318 kernel: iscsi: registered transport (tcp) Sep 6 00:27:14.515466 kernel: iscsi: registered transport (qla4xxx) Sep 6 00:27:14.515548 kernel: QLogic iSCSI HBA Driver Sep 6 00:27:14.570625 systemd[1]: Finished dracut-cmdline.service. Sep 6 00:27:14.572641 systemd[1]: Starting dracut-pre-udev.service... Sep 6 00:27:14.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.632405 kernel: raid6: sse2x4 gen() 13872 MB/s Sep 6 00:27:14.650343 kernel: raid6: sse2x4 xor() 7966 MB/s Sep 6 00:27:14.668336 kernel: raid6: sse2x2 gen() 9566 MB/s Sep 6 00:27:14.686340 kernel: raid6: sse2x2 xor() 8055 MB/s Sep 6 00:27:14.704347 kernel: raid6: sse2x1 gen() 9789 MB/s Sep 6 00:27:14.722997 kernel: raid6: sse2x1 xor() 7216 MB/s Sep 6 00:27:14.723086 kernel: raid6: using algorithm sse2x4 gen() 13872 MB/s Sep 6 00:27:14.723106 kernel: raid6: .... xor() 7966 MB/s, rmw enabled Sep 6 00:27:14.724382 kernel: raid6: using ssse3x2 recovery algorithm Sep 6 00:27:14.742361 kernel: xor: automatically using best checksumming function avx Sep 6 00:27:14.859321 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 00:27:14.875867 systemd[1]: Finished dracut-pre-udev.service. Sep 6 00:27:14.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.881000 audit: BPF prog-id=7 op=LOAD Sep 6 00:27:14.881000 audit: BPF prog-id=8 op=LOAD Sep 6 00:27:14.883035 systemd[1]: Starting systemd-udevd.service... Sep 6 00:27:14.901641 systemd-udevd[401]: Using default interface naming scheme 'v252'. Sep 6 00:27:14.910015 systemd[1]: Started systemd-udevd.service. Sep 6 00:27:14.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:14.916973 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 00:27:14.937145 dracut-pre-trigger[414]: rd.md=0: removing MD RAID activation Sep 6 00:27:14.981813 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 00:27:14.983570 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:27:14.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:15.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:15.095587 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:27:15.208316 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 00:27:15.226307 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Sep 6 00:27:15.255959 kernel: AVX version of gcm_enc/dec engaged. Sep 6 00:27:15.255985 kernel: AES CTR mode by8 optimization enabled Sep 6 00:27:15.256011 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 00:27:15.256029 kernel: GPT:17805311 != 125829119 Sep 6 00:27:15.256045 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 00:27:15.256061 kernel: GPT:17805311 != 125829119 Sep 6 00:27:15.256076 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 00:27:15.256093 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:27:15.266302 kernel: libata version 3.00 loaded. Sep 6 00:27:15.277305 kernel: ACPI: bus type USB registered Sep 6 00:27:15.277381 kernel: usbcore: registered new interface driver usbfs Sep 6 00:27:15.277411 kernel: usbcore: registered new interface driver hub Sep 6 00:27:15.277429 kernel: usbcore: registered new device driver usb Sep 6 00:27:15.293309 kernel: ahci 0000:00:1f.2: version 3.0 Sep 6 00:27:15.364787 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Sep 6 00:27:15.364816 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Sep 6 00:27:15.365010 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Sep 6 00:27:15.365190 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (457) Sep 6 00:27:15.365212 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 00:27:15.365446 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Sep 6 00:27:15.365633 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Sep 6 00:27:15.365815 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 00:27:15.365998 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Sep 6 00:27:15.366180 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Sep 6 00:27:15.366393 kernel: hub 1-0:1.0: USB hub found Sep 6 00:27:15.366609 kernel: hub 1-0:1.0: 4 ports detected Sep 6 00:27:15.366816 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Sep 6 00:27:15.367102 kernel: hub 2-0:1.0: USB hub found Sep 6 00:27:15.367349 kernel: hub 2-0:1.0: 4 ports detected Sep 6 00:27:15.367552 kernel: scsi host0: ahci Sep 6 00:27:15.367750 kernel: scsi host1: ahci Sep 6 00:27:15.367950 kernel: scsi host2: ahci Sep 6 00:27:15.368144 kernel: scsi host3: ahci Sep 6 00:27:15.368376 kernel: scsi host4: ahci Sep 6 00:27:15.368566 kernel: scsi host5: ahci Sep 6 00:27:15.368763 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Sep 6 00:27:15.368784 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Sep 6 00:27:15.368801 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Sep 6 00:27:15.368818 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Sep 6 00:27:15.368841 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Sep 6 00:27:15.368859 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Sep 6 00:27:15.327321 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 00:27:15.451504 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 00:27:15.452402 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 00:27:15.465706 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 00:27:15.471142 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:27:15.473029 systemd[1]: Starting disk-uuid.service... Sep 6 00:27:15.482673 disk-uuid[528]: Primary Header is updated. Sep 6 00:27:15.482673 disk-uuid[528]: Secondary Entries is updated. Sep 6 00:27:15.482673 disk-uuid[528]: Secondary Header is updated. Sep 6 00:27:15.488306 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:27:15.495323 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:27:15.503330 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:27:15.563390 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Sep 6 00:27:15.682312 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 6 00:27:15.684325 kernel: ata2: SATA link down (SStatus 0 SControl 300) Sep 6 00:27:15.684383 kernel: ata1: SATA link down (SStatus 0 SControl 300) Sep 6 00:27:15.687385 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 6 00:27:15.689022 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 6 00:27:15.690906 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 6 00:27:15.728304 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 00:27:15.742832 kernel: usbcore: registered new interface driver usbhid Sep 6 00:27:15.742903 kernel: usbhid: USB HID core driver Sep 6 00:27:15.752983 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Sep 6 00:27:15.753051 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Sep 6 00:27:16.506167 disk-uuid[529]: The operation has completed successfully. Sep 6 00:27:16.507197 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 00:27:16.557848 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 00:27:16.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.558017 systemd[1]: Finished disk-uuid.service. Sep 6 00:27:16.568120 systemd[1]: Starting verity-setup.service... Sep 6 00:27:16.592312 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Sep 6 00:27:16.651480 systemd[1]: Found device dev-mapper-usr.device. Sep 6 00:27:16.653538 systemd[1]: Mounting sysusr-usr.mount... Sep 6 00:27:16.655535 systemd[1]: Finished verity-setup.service. Sep 6 00:27:16.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.750340 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 00:27:16.751484 systemd[1]: Mounted sysusr-usr.mount. Sep 6 00:27:16.752404 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 00:27:16.753566 systemd[1]: Starting ignition-setup.service... Sep 6 00:27:16.755594 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 00:27:16.788937 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:27:16.789005 kernel: BTRFS info (device vda6): using free space tree Sep 6 00:27:16.789025 kernel: BTRFS info (device vda6): has skinny extents Sep 6 00:27:16.806812 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 00:27:16.819268 systemd[1]: Finished ignition-setup.service. Sep 6 00:27:16.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.821213 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 00:27:16.886197 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 00:27:16.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.887000 audit: BPF prog-id=9 op=LOAD Sep 6 00:27:16.889077 systemd[1]: Starting systemd-networkd.service... Sep 6 00:27:16.923033 systemd-networkd[705]: lo: Link UP Sep 6 00:27:16.923042 systemd-networkd[705]: lo: Gained carrier Sep 6 00:27:16.927471 systemd-networkd[705]: Enumeration completed Sep 6 00:27:16.928251 systemd-networkd[705]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:27:16.930444 systemd-networkd[705]: eth0: Link UP Sep 6 00:27:16.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.930451 systemd-networkd[705]: eth0: Gained carrier Sep 6 00:27:16.930945 systemd[1]: Started systemd-networkd.service. Sep 6 00:27:16.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.934690 systemd[1]: Reached target network.target. Sep 6 00:27:16.936580 systemd[1]: Starting iscsiuio.service... Sep 6 00:27:16.952930 systemd[1]: Started iscsiuio.service. Sep 6 00:27:16.956361 systemd[1]: Starting iscsid.service... Sep 6 00:27:16.961814 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:27:16.961814 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 00:27:16.961814 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 00:27:16.961814 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 00:27:16.961814 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 00:27:16.961814 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 00:27:16.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.966746 systemd[1]: Started iscsid.service. Sep 6 00:27:16.969878 systemd[1]: Starting dracut-initqueue.service... Sep 6 00:27:16.972457 systemd-networkd[705]: eth0: DHCPv4 address 10.244.9.98/30, gateway 10.244.9.97 acquired from 10.244.9.97 Sep 6 00:27:16.995937 systemd[1]: Finished dracut-initqueue.service. Sep 6 00:27:16.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:16.996888 systemd[1]: Reached target remote-fs-pre.target. Sep 6 00:27:16.998568 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:27:17.001009 systemd[1]: Reached target remote-fs.target. Sep 6 00:27:17.003117 systemd[1]: Starting dracut-pre-mount.service... Sep 6 00:27:17.017857 systemd[1]: Finished dracut-pre-mount.service. Sep 6 00:27:17.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.079331 ignition[659]: Ignition 2.14.0 Sep 6 00:27:17.080384 ignition[659]: Stage: fetch-offline Sep 6 00:27:17.080538 ignition[659]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:17.080593 ignition[659]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:17.082216 ignition[659]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:17.083585 ignition[659]: parsed url from cmdline: "" Sep 6 00:27:17.083609 ignition[659]: no config URL provided Sep 6 00:27:17.083621 ignition[659]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:27:17.083655 ignition[659]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:27:17.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.085421 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 00:27:17.083666 ignition[659]: failed to fetch config: resource requires networking Sep 6 00:27:17.087398 systemd[1]: Starting ignition-fetch.service... Sep 6 00:27:17.084191 ignition[659]: Ignition finished successfully Sep 6 00:27:17.099254 ignition[728]: Ignition 2.14.0 Sep 6 00:27:17.099285 ignition[728]: Stage: fetch Sep 6 00:27:17.099475 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:17.099513 ignition[728]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:17.100784 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:17.100926 ignition[728]: parsed url from cmdline: "" Sep 6 00:27:17.100934 ignition[728]: no config URL provided Sep 6 00:27:17.100944 ignition[728]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 00:27:17.100961 ignition[728]: no config at "/usr/lib/ignition/user.ign" Sep 6 00:27:17.106188 ignition[728]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Sep 6 00:27:17.106234 ignition[728]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Sep 6 00:27:17.107258 ignition[728]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Sep 6 00:27:17.126751 ignition[728]: GET result: OK Sep 6 00:27:17.126960 ignition[728]: parsing config with SHA512: 988ccd8fb9afad3982b6d5077a25f9b05c82539bedb2a4f74afc82db278bf2dabe1e8c5a8c0aa3776f47b5280088764d8d51c0e07b9eda7af376e07e588bb915 Sep 6 00:27:17.138523 unknown[728]: fetched base config from "system" Sep 6 00:27:17.139465 unknown[728]: fetched base config from "system" Sep 6 00:27:17.140212 unknown[728]: fetched user config from "openstack" Sep 6 00:27:17.141565 ignition[728]: fetch: fetch complete Sep 6 00:27:17.142303 ignition[728]: fetch: fetch passed Sep 6 00:27:17.143054 ignition[728]: Ignition finished successfully Sep 6 00:27:17.145492 systemd[1]: Finished ignition-fetch.service. Sep 6 00:27:17.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.148037 systemd[1]: Starting ignition-kargs.service... Sep 6 00:27:17.160692 ignition[734]: Ignition 2.14.0 Sep 6 00:27:17.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.165157 systemd[1]: Finished ignition-kargs.service. Sep 6 00:27:17.160706 ignition[734]: Stage: kargs Sep 6 00:27:17.167222 systemd[1]: Starting ignition-disks.service... Sep 6 00:27:17.160870 ignition[734]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:17.160906 ignition[734]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:17.162630 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:17.164083 ignition[734]: kargs: kargs passed Sep 6 00:27:17.164150 ignition[734]: Ignition finished successfully Sep 6 00:27:17.178607 ignition[739]: Ignition 2.14.0 Sep 6 00:27:17.178630 ignition[739]: Stage: disks Sep 6 00:27:17.178863 ignition[739]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:17.178901 ignition[739]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:17.180574 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:17.182127 ignition[739]: disks: disks passed Sep 6 00:27:17.182196 ignition[739]: Ignition finished successfully Sep 6 00:27:17.183097 systemd[1]: Finished ignition-disks.service. Sep 6 00:27:17.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.184803 systemd[1]: Reached target initrd-root-device.target. Sep 6 00:27:17.186175 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:27:17.186848 systemd[1]: Reached target local-fs.target. Sep 6 00:27:17.187468 systemd[1]: Reached target sysinit.target. Sep 6 00:27:17.188832 systemd[1]: Reached target basic.target. Sep 6 00:27:17.191479 systemd[1]: Starting systemd-fsck-root.service... Sep 6 00:27:17.215543 systemd-fsck[746]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 6 00:27:17.219568 systemd[1]: Finished systemd-fsck-root.service. Sep 6 00:27:17.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.221460 systemd[1]: Mounting sysroot.mount... Sep 6 00:27:17.243321 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 00:27:17.244706 systemd[1]: Mounted sysroot.mount. Sep 6 00:27:17.245573 systemd[1]: Reached target initrd-root-fs.target. Sep 6 00:27:17.248458 systemd[1]: Mounting sysroot-usr.mount... Sep 6 00:27:17.249711 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 00:27:17.250881 systemd[1]: Starting flatcar-openstack-hostname.service... Sep 6 00:27:17.251663 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 00:27:17.251724 systemd[1]: Reached target ignition-diskful.target. Sep 6 00:27:17.258042 systemd[1]: Mounted sysroot-usr.mount. Sep 6 00:27:17.262254 systemd[1]: Starting initrd-setup-root.service... Sep 6 00:27:17.269967 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 00:27:17.284777 initrd-setup-root[765]: cut: /sysroot/etc/group: No such file or directory Sep 6 00:27:17.296600 initrd-setup-root[773]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 00:27:17.303570 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 00:27:17.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.384869 systemd[1]: Finished initrd-setup-root.service. Sep 6 00:27:17.386938 systemd[1]: Starting ignition-mount.service... Sep 6 00:27:17.393235 systemd[1]: Starting sysroot-boot.service... Sep 6 00:27:17.405214 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Sep 6 00:27:17.425541 ignition[801]: INFO : Ignition 2.14.0 Sep 6 00:27:17.425541 ignition[801]: INFO : Stage: mount Sep 6 00:27:17.427194 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:17.427194 ignition[801]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:17.429899 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:17.431085 ignition[801]: INFO : mount: mount passed Sep 6 00:27:17.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.433996 ignition[801]: INFO : Ignition finished successfully Sep 6 00:27:17.432247 systemd[1]: Finished ignition-mount.service. Sep 6 00:27:17.437675 systemd[1]: Finished sysroot-boot.service. Sep 6 00:27:17.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.446881 coreos-metadata[752]: Sep 06 00:27:17.446 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 00:27:17.465586 coreos-metadata[752]: Sep 06 00:27:17.465 INFO Fetch successful Sep 6 00:27:17.466613 coreos-metadata[752]: Sep 06 00:27:17.466 INFO wrote hostname srv-vva2b.gb1.brightbox.com to /sysroot/etc/hostname Sep 6 00:27:17.471455 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Sep 6 00:27:17.471623 systemd[1]: Finished flatcar-openstack-hostname.service. Sep 6 00:27:17.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:17.677868 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 00:27:17.699617 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (809) Sep 6 00:27:17.718386 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 00:27:17.718463 kernel: BTRFS info (device vda6): using free space tree Sep 6 00:27:17.718483 kernel: BTRFS info (device vda6): has skinny extents Sep 6 00:27:17.728571 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 00:27:17.731848 systemd[1]: Starting ignition-files.service... Sep 6 00:27:17.761624 ignition[829]: INFO : Ignition 2.14.0 Sep 6 00:27:17.761624 ignition[829]: INFO : Stage: files Sep 6 00:27:17.761624 ignition[829]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:17.761624 ignition[829]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:17.761624 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:17.767965 ignition[829]: DEBUG : files: compiled without relabeling support, skipping Sep 6 00:27:17.772796 ignition[829]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 00:27:17.772796 ignition[829]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 00:27:17.779661 ignition[829]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 00:27:17.781702 ignition[829]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 00:27:17.784352 unknown[829]: wrote ssh authorized keys file for user: core Sep 6 00:27:17.785996 ignition[829]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 00:27:17.790351 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Sep 6 00:27:17.790351 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Sep 6 00:27:17.969937 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Sep 6 00:27:18.200548 systemd-networkd[705]: eth0: Gained IPv6LL Sep 6 00:27:18.369168 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Sep 6 00:27:18.370774 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 6 00:27:18.371895 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 00:27:18.371895 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 6 00:27:18.374109 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 6 00:27:18.374109 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 6 00:27:18.374109 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 6 00:27:18.374109 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 6 00:27:18.374109 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 6 00:27:18.379784 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:27:18.379784 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 00:27:18.379784 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:27:18.379784 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:27:18.379784 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:27:18.379784 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Sep 6 00:27:18.823375 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Sep 6 00:27:19.713666 systemd-networkd[705]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:258:24:19ff:fef4:962/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:258:24:19ff:fef4:962/64 assigned by NDisc. Sep 6 00:27:19.713681 systemd-networkd[705]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 00:27:21.655902 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 6 00:27:21.655902 ignition[829]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:27:21.655902 ignition[829]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 00:27:21.655902 ignition[829]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Sep 6 00:27:21.662813 ignition[829]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 6 00:27:21.669826 ignition[829]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 6 00:27:21.669826 ignition[829]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Sep 6 00:27:21.669826 ignition[829]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:27:21.669826 ignition[829]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 00:27:21.669826 ignition[829]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Sep 6 00:27:21.669826 ignition[829]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Sep 6 00:27:21.682141 ignition[829]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:27:21.683461 ignition[829]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 00:27:21.683461 ignition[829]: INFO : files: files passed Sep 6 00:27:21.683461 ignition[829]: INFO : Ignition finished successfully Sep 6 00:27:21.684674 systemd[1]: Finished ignition-files.service. Sep 6 00:27:21.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.698360 kernel: kauditd_printk_skb: 28 callbacks suppressed Sep 6 00:27:21.698460 kernel: audit: type=1130 audit(1757118441.691:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.698696 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 00:27:21.700134 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 00:27:21.702471 systemd[1]: Starting ignition-quench.service... Sep 6 00:27:21.710871 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 00:27:21.711035 systemd[1]: Finished ignition-quench.service. Sep 6 00:27:21.727672 kernel: audit: type=1130 audit(1757118441.712:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.727710 kernel: audit: type=1131 audit(1757118441.712:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.727841 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 00:27:21.729614 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 00:27:21.730599 systemd[1]: Reached target ignition-complete.target. Sep 6 00:27:21.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.739334 kernel: audit: type=1130 audit(1757118441.729:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.740086 systemd[1]: Starting initrd-parse-etc.service... Sep 6 00:27:21.769778 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 00:27:21.770990 systemd[1]: Finished initrd-parse-etc.service. Sep 6 00:27:21.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.772760 systemd[1]: Reached target initrd-fs.target. Sep 6 00:27:21.796068 kernel: audit: type=1130 audit(1757118441.772:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.796120 kernel: audit: type=1131 audit(1757118441.772:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.796455 systemd[1]: Reached target initrd.target. Sep 6 00:27:21.800590 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 00:27:21.802193 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 00:27:21.827585 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 00:27:21.847953 kernel: audit: type=1130 audit(1757118441.828:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.837109 systemd[1]: Starting initrd-cleanup.service... Sep 6 00:27:21.857939 systemd[1]: Stopped target nss-lookup.target. Sep 6 00:27:21.885528 kernel: audit: type=1131 audit(1757118441.862:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.859257 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 00:27:21.860166 systemd[1]: Stopped target timers.target. Sep 6 00:27:21.861408 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 00:27:21.861688 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 00:27:21.862701 systemd[1]: Stopped target initrd.target. Sep 6 00:27:21.863557 systemd[1]: Stopped target basic.target. Sep 6 00:27:21.921732 kernel: audit: type=1131 audit(1757118441.896:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.921780 kernel: audit: type=1131 audit(1757118441.898:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.864365 systemd[1]: Stopped target ignition-complete.target. Sep 6 00:27:21.885321 systemd[1]: Stopped target ignition-diskful.target. Sep 6 00:27:21.886304 systemd[1]: Stopped target initrd-root-device.target. Sep 6 00:27:21.887838 systemd[1]: Stopped target remote-fs.target. Sep 6 00:27:21.888660 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 00:27:21.889541 systemd[1]: Stopped target sysinit.target. Sep 6 00:27:21.890895 systemd[1]: Stopped target local-fs.target. Sep 6 00:27:21.893934 systemd[1]: Stopped target local-fs-pre.target. Sep 6 00:27:21.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.894900 systemd[1]: Stopped target swap.target. Sep 6 00:27:21.937037 ignition[867]: INFO : Ignition 2.14.0 Sep 6 00:27:21.937037 ignition[867]: INFO : Stage: umount Sep 6 00:27:21.937037 ignition[867]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 00:27:21.937037 ignition[867]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 00:27:21.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.895649 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 00:27:21.943983 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 00:27:21.895922 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 00:27:21.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.948727 ignition[867]: INFO : umount: umount passed Sep 6 00:27:21.948727 ignition[867]: INFO : Ignition finished successfully Sep 6 00:27:21.896915 systemd[1]: Stopped target cryptsetup.target. Sep 6 00:27:21.897657 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 00:27:21.897957 systemd[1]: Stopped dracut-initqueue.service. Sep 6 00:27:21.898928 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 00:27:21.899169 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 00:27:21.900313 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 00:27:21.900568 systemd[1]: Stopped ignition-files.service. Sep 6 00:27:21.908555 systemd[1]: Stopping ignition-mount.service... Sep 6 00:27:21.919433 systemd[1]: Stopping sysroot-boot.service... Sep 6 00:27:21.927775 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 00:27:21.928921 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 00:27:21.936126 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 00:27:21.936465 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 00:27:21.944419 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 00:27:21.944592 systemd[1]: Finished initrd-cleanup.service. Sep 6 00:27:21.948666 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 00:27:21.948841 systemd[1]: Stopped ignition-mount.service. Sep 6 00:27:21.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.966172 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 00:27:21.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.967597 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 00:27:21.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.967672 systemd[1]: Stopped ignition-disks.service. Sep 6 00:27:21.968692 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 00:27:21.968756 systemd[1]: Stopped ignition-kargs.service. Sep 6 00:27:21.969990 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 00:27:21.970052 systemd[1]: Stopped ignition-fetch.service. Sep 6 00:27:21.970762 systemd[1]: Stopped target network.target. Sep 6 00:27:21.971428 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 00:27:21.971516 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 00:27:21.972720 systemd[1]: Stopped target paths.target. Sep 6 00:27:21.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.974020 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 00:27:21.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.981202 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 00:27:21.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.983637 systemd[1]: Stopped target slices.target. Sep 6 00:27:22.001000 audit: BPF prog-id=6 op=UNLOAD Sep 6 00:27:21.984227 systemd[1]: Stopped target sockets.target. Sep 6 00:27:21.985835 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 00:27:21.985891 systemd[1]: Closed iscsid.socket. Sep 6 00:27:22.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:21.986505 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 00:27:21.986554 systemd[1]: Closed iscsiuio.socket. Sep 6 00:27:21.987147 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 00:27:21.987248 systemd[1]: Stopped ignition-setup.service. Sep 6 00:27:21.988188 systemd[1]: Stopping systemd-networkd.service... Sep 6 00:27:21.989828 systemd[1]: Stopping systemd-resolved.service... Sep 6 00:27:21.990939 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 00:27:21.991099 systemd[1]: Stopped sysroot-boot.service. Sep 6 00:27:21.994796 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 00:27:21.994990 systemd[1]: Stopped systemd-resolved.service. Sep 6 00:27:21.997058 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 00:27:21.997128 systemd[1]: Stopped initrd-setup-root.service. Sep 6 00:27:22.001437 systemd-networkd[705]: eth0: DHCPv6 lease lost Sep 6 00:27:22.005800 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 00:27:22.005974 systemd[1]: Stopped systemd-networkd.service. Sep 6 00:27:22.022644 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 00:27:22.022733 systemd[1]: Closed systemd-networkd.socket. Sep 6 00:27:22.024871 systemd[1]: Stopping network-cleanup.service... Sep 6 00:27:22.025571 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 00:27:22.025673 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 00:27:22.026517 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 00:27:22.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.026598 systemd[1]: Stopped systemd-sysctl.service. Sep 6 00:27:22.053925 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 00:27:22.054071 systemd[1]: Stopped systemd-modules-load.service. Sep 6 00:27:22.055449 systemd[1]: Stopping systemd-udevd.service... Sep 6 00:27:22.058992 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 00:27:22.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.065000 audit: BPF prog-id=9 op=UNLOAD Sep 6 00:27:22.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.083540 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 00:27:22.083789 systemd[1]: Stopped systemd-udevd.service. Sep 6 00:27:22.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.087432 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 00:27:22.087582 systemd[1]: Stopped network-cleanup.service. Sep 6 00:27:22.088816 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 00:27:22.088881 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 00:27:22.090248 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 00:27:22.090335 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 00:27:22.096179 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 00:27:22.096346 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 00:27:22.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.100361 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 00:27:22.100481 systemd[1]: Stopped dracut-cmdline.service. Sep 6 00:27:22.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.102167 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 00:27:22.102519 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 00:27:22.111020 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 00:27:22.114692 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 00:27:22.115753 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 00:27:22.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.117777 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 00:27:22.118830 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 00:27:22.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.141888 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 00:27:22.142066 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 00:27:22.144931 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 00:27:22.146858 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 00:27:22.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.147038 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 00:27:22.148462 systemd[1]: Reached target initrd-switch-root.target. Sep 6 00:27:22.152597 systemd[1]: Starting initrd-switch-root.service... Sep 6 00:27:22.173682 systemd[1]: Switching root. Sep 6 00:27:22.197930 systemd-journald[202]: Journal stopped Sep 6 00:27:26.745620 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). Sep 6 00:27:26.745737 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 00:27:26.745785 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 00:27:26.745821 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 00:27:26.745842 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 00:27:26.745861 kernel: SELinux: policy capability open_perms=1 Sep 6 00:27:26.745880 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 00:27:26.745899 kernel: SELinux: policy capability always_check_network=0 Sep 6 00:27:26.745918 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 00:27:26.745946 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 00:27:26.745983 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 00:27:26.746004 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 00:27:26.746025 systemd[1]: Successfully loaded SELinux policy in 62.874ms. Sep 6 00:27:26.746054 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 17.301ms. Sep 6 00:27:26.746094 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 00:27:26.746116 systemd[1]: Detected virtualization kvm. Sep 6 00:27:26.746149 systemd[1]: Detected architecture x86-64. Sep 6 00:27:26.746173 systemd[1]: Detected first boot. Sep 6 00:27:26.746208 systemd[1]: Hostname set to . Sep 6 00:27:26.746242 systemd[1]: Initializing machine ID from VM UUID. Sep 6 00:27:26.746265 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 00:27:26.746298 systemd[1]: Populated /etc with preset unit settings. Sep 6 00:27:26.746333 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:27:26.746369 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:27:26.746394 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:27:26.746417 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 00:27:26.746438 systemd[1]: Stopped iscsiuio.service. Sep 6 00:27:26.746465 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 00:27:26.746493 systemd[1]: Stopped iscsid.service. Sep 6 00:27:26.746527 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 00:27:26.746556 systemd[1]: Stopped initrd-switch-root.service. Sep 6 00:27:26.746584 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 00:27:26.746606 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 00:27:26.746627 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 00:27:26.746648 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 00:27:26.746683 systemd[1]: Created slice system-getty.slice. Sep 6 00:27:26.746705 systemd[1]: Created slice system-modprobe.slice. Sep 6 00:27:26.746738 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 00:27:26.746774 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 00:27:26.746806 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 00:27:26.746828 systemd[1]: Created slice user.slice. Sep 6 00:27:26.746849 systemd[1]: Started systemd-ask-password-console.path. Sep 6 00:27:26.746869 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 00:27:26.746896 systemd[1]: Set up automount boot.automount. Sep 6 00:27:26.746929 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 00:27:26.746951 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 00:27:26.746973 systemd[1]: Stopped target initrd-fs.target. Sep 6 00:27:26.746993 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 00:27:26.747020 systemd[1]: Reached target integritysetup.target. Sep 6 00:27:26.747042 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 00:27:26.747070 systemd[1]: Reached target remote-fs.target. Sep 6 00:27:26.747097 systemd[1]: Reached target slices.target. Sep 6 00:27:26.747119 systemd[1]: Reached target swap.target. Sep 6 00:27:26.747150 systemd[1]: Reached target torcx.target. Sep 6 00:27:26.747185 systemd[1]: Reached target veritysetup.target. Sep 6 00:27:26.747208 systemd[1]: Listening on systemd-coredump.socket. Sep 6 00:27:26.747257 systemd[1]: Listening on systemd-initctl.socket. Sep 6 00:27:26.753954 systemd[1]: Listening on systemd-networkd.socket. Sep 6 00:27:26.754005 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 00:27:26.754029 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 00:27:26.754050 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 00:27:26.754071 systemd[1]: Mounting dev-hugepages.mount... Sep 6 00:27:26.754100 systemd[1]: Mounting dev-mqueue.mount... Sep 6 00:27:26.754149 systemd[1]: Mounting media.mount... Sep 6 00:27:26.754173 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:27:26.754194 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 00:27:26.754214 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 00:27:26.754243 systemd[1]: Mounting tmp.mount... Sep 6 00:27:26.754264 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 00:27:26.754304 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:27:26.754328 systemd[1]: Starting kmod-static-nodes.service... Sep 6 00:27:26.754349 systemd[1]: Starting modprobe@configfs.service... Sep 6 00:27:26.754383 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:27:26.754429 systemd[1]: Starting modprobe@drm.service... Sep 6 00:27:26.754459 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:27:26.754480 systemd[1]: Starting modprobe@fuse.service... Sep 6 00:27:26.754509 systemd[1]: Starting modprobe@loop.service... Sep 6 00:27:26.754531 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 00:27:26.754560 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 00:27:26.754594 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 00:27:26.754617 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 00:27:26.754653 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 00:27:26.754676 systemd[1]: Stopped systemd-journald.service. Sep 6 00:27:26.754707 systemd[1]: Starting systemd-journald.service... Sep 6 00:27:26.754729 systemd[1]: Starting systemd-modules-load.service... Sep 6 00:27:26.754755 systemd[1]: Starting systemd-network-generator.service... Sep 6 00:27:26.754777 systemd[1]: Starting systemd-remount-fs.service... Sep 6 00:27:26.754797 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 00:27:26.754829 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 00:27:26.754857 kernel: loop: module loaded Sep 6 00:27:26.754894 systemd[1]: Stopped verity-setup.service. Sep 6 00:27:26.754917 kernel: kauditd_printk_skb: 74 callbacks suppressed Sep 6 00:27:26.754937 kernel: audit: type=1131 audit(1757118446.713:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.756522 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:27:26.756572 kernel: fuse: init (API version 7.34) Sep 6 00:27:26.756594 systemd[1]: Mounted dev-hugepages.mount. Sep 6 00:27:26.756616 systemd[1]: Mounted dev-mqueue.mount. Sep 6 00:27:26.756637 systemd[1]: Mounted media.mount. Sep 6 00:27:26.756672 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 00:27:26.756707 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 00:27:26.756729 systemd[1]: Mounted tmp.mount. Sep 6 00:27:26.756749 kernel: audit: type=1305 audit(1757118446.742:117): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:27:26.756770 kernel: audit: type=1300 audit(1757118446.742:117): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd50f78c10 a2=4000 a3=7ffd50f78cac items=0 ppid=1 pid=979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:26.756790 systemd[1]: Finished kmod-static-nodes.service. Sep 6 00:27:26.756831 systemd-journald[979]: Journal started Sep 6 00:27:26.756908 systemd-journald[979]: Runtime Journal (/run/log/journal/a0a35a1fc39940c4b3a3e17c9260b124) is 4.7M, max 38.1M, 33.3M free. Sep 6 00:27:22.418000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 00:27:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:27:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 00:27:22.559000 audit: BPF prog-id=10 op=LOAD Sep 6 00:27:22.559000 audit: BPF prog-id=10 op=UNLOAD Sep 6 00:27:26.758787 systemd[1]: Started systemd-journald.service. Sep 6 00:27:22.559000 audit: BPF prog-id=11 op=LOAD Sep 6 00:27:22.559000 audit: BPF prog-id=11 op=UNLOAD Sep 6 00:27:22.728000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 00:27:22.728000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d88c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:22.728000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:27:22.732000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 00:27:22.732000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d965 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:26.760093 kernel: audit: type=1327 audit(1757118446.742:117): proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:27:22.732000 audit: CWD cwd="/" Sep 6 00:27:22.732000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:22.732000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:22.732000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 00:27:26.468000 audit: BPF prog-id=12 op=LOAD Sep 6 00:27:26.468000 audit: BPF prog-id=3 op=UNLOAD Sep 6 00:27:26.468000 audit: BPF prog-id=13 op=LOAD Sep 6 00:27:26.469000 audit: BPF prog-id=14 op=LOAD Sep 6 00:27:26.469000 audit: BPF prog-id=4 op=UNLOAD Sep 6 00:27:26.469000 audit: BPF prog-id=5 op=UNLOAD Sep 6 00:27:26.470000 audit: BPF prog-id=15 op=LOAD Sep 6 00:27:26.470000 audit: BPF prog-id=12 op=UNLOAD Sep 6 00:27:26.470000 audit: BPF prog-id=16 op=LOAD Sep 6 00:27:26.470000 audit: BPF prog-id=17 op=LOAD Sep 6 00:27:26.470000 audit: BPF prog-id=13 op=UNLOAD Sep 6 00:27:26.470000 audit: BPF prog-id=14 op=UNLOAD Sep 6 00:27:26.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.480000 audit: BPF prog-id=15 op=UNLOAD Sep 6 00:27:26.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.656000 audit: BPF prog-id=18 op=LOAD Sep 6 00:27:26.656000 audit: BPF prog-id=19 op=LOAD Sep 6 00:27:26.656000 audit: BPF prog-id=20 op=LOAD Sep 6 00:27:26.656000 audit: BPF prog-id=16 op=UNLOAD Sep 6 00:27:26.656000 audit: BPF prog-id=17 op=UNLOAD Sep 6 00:27:26.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.742000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 00:27:26.742000 audit[979]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd50f78c10 a2=4000 a3=7ffd50f78cac items=0 ppid=1 pid=979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:26.742000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 00:27:22.723487 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:27:26.463499 systemd[1]: Queued start job for default target multi-user.target. Sep 6 00:27:26.769491 kernel: audit: type=1130 audit(1757118446.756:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:22.724394 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:27:26.463518 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 6 00:27:22.724451 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:27:26.472629 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 00:27:22.724509 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 00:27:26.759907 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 00:27:22.724528 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 00:27:26.762589 systemd[1]: Finished modprobe@configfs.service. Sep 6 00:27:22.724603 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 00:27:26.763652 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:27:22.724626 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 00:27:26.769407 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:27:22.725029 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 00:27:26.770644 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:27:22.725116 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 00:27:26.770834 systemd[1]: Finished modprobe@drm.service. Sep 6 00:27:22.725146 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 00:27:22.727541 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 00:27:26.772162 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:27:22.727602 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 00:27:26.772387 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:27:22.727635 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 00:27:26.773570 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 00:27:22.727663 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 00:27:26.773756 systemd[1]: Finished modprobe@fuse.service. Sep 6 00:27:22.727697 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 00:27:22.727728 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 00:27:26.774968 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:27:25.872786 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:27:26.775166 systemd[1]: Finished modprobe@loop.service. Sep 6 00:27:25.873228 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:27:25.873470 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:27:26.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:25.873994 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 00:27:25.874084 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 00:27:25.874226 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2025-09-06T00:27:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 00:27:26.781875 systemd[1]: Finished systemd-modules-load.service. Sep 6 00:27:26.782323 kernel: audit: type=1130 audit(1757118446.759:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.783020 systemd[1]: Finished systemd-network-generator.service. Sep 6 00:27:26.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.789571 systemd[1]: Finished systemd-remount-fs.service. Sep 6 00:27:26.790299 kernel: audit: type=1130 audit(1757118446.762:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.790999 systemd[1]: Reached target network-pre.target. Sep 6 00:27:26.793664 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 00:27:26.796027 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 00:27:26.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.808191 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 00:27:26.808528 kernel: audit: type=1131 audit(1757118446.762:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.815353 kernel: audit: type=1130 audit(1757118446.769:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.821468 kernel: audit: type=1131 audit(1757118446.769:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.823719 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 00:27:26.826328 systemd[1]: Starting systemd-journal-flush.service... Sep 6 00:27:26.827845 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:27:26.829528 systemd[1]: Starting systemd-random-seed.service... Sep 6 00:27:26.831086 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:27:26.833272 systemd[1]: Starting systemd-sysctl.service... Sep 6 00:27:26.838272 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 00:27:26.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.841584 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 00:27:26.842558 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 00:27:26.845255 systemd[1]: Starting systemd-sysusers.service... Sep 6 00:27:26.847190 systemd-journald[979]: Time spent on flushing to /var/log/journal/a0a35a1fc39940c4b3a3e17c9260b124 is 68.594ms for 1303 entries. Sep 6 00:27:26.847190 systemd-journald[979]: System Journal (/var/log/journal/a0a35a1fc39940c4b3a3e17c9260b124) is 8.0M, max 584.8M, 576.8M free. Sep 6 00:27:26.940317 systemd-journald[979]: Received client request to flush runtime journal. Sep 6 00:27:26.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.858691 systemd[1]: Finished systemd-random-seed.service. Sep 6 00:27:26.859568 systemd[1]: Reached target first-boot-complete.target. Sep 6 00:27:26.878927 systemd[1]: Finished systemd-sysctl.service. Sep 6 00:27:26.908230 systemd[1]: Finished systemd-sysusers.service. Sep 6 00:27:26.911870 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 00:27:26.941946 systemd[1]: Finished systemd-journal-flush.service. Sep 6 00:27:26.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.972687 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 00:27:26.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.983936 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 00:27:26.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:26.986616 systemd[1]: Starting systemd-udev-settle.service... Sep 6 00:27:26.998561 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 6 00:27:27.555393 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 00:27:27.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:27.557000 audit: BPF prog-id=21 op=LOAD Sep 6 00:27:27.557000 audit: BPF prog-id=22 op=LOAD Sep 6 00:27:27.558000 audit: BPF prog-id=7 op=UNLOAD Sep 6 00:27:27.558000 audit: BPF prog-id=8 op=UNLOAD Sep 6 00:27:27.559660 systemd[1]: Starting systemd-udevd.service... Sep 6 00:27:27.588167 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Sep 6 00:27:27.622012 systemd[1]: Started systemd-udevd.service. Sep 6 00:27:27.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:27.624000 audit: BPF prog-id=23 op=LOAD Sep 6 00:27:27.628377 systemd[1]: Starting systemd-networkd.service... Sep 6 00:27:27.656000 audit: BPF prog-id=24 op=LOAD Sep 6 00:27:27.657000 audit: BPF prog-id=25 op=LOAD Sep 6 00:27:27.657000 audit: BPF prog-id=26 op=LOAD Sep 6 00:27:27.658680 systemd[1]: Starting systemd-userdbd.service... Sep 6 00:27:27.704176 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 00:27:27.715181 systemd[1]: Started systemd-userdbd.service. Sep 6 00:27:27.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:27.804448 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 00:27:27.828474 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Sep 6 00:27:27.833298 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 00:27:27.856336 kernel: ACPI: button: Power Button [PWRF] Sep 6 00:27:27.869915 systemd-networkd[1025]: lo: Link UP Sep 6 00:27:27.870414 systemd-networkd[1025]: lo: Gained carrier Sep 6 00:27:27.871349 systemd-networkd[1025]: Enumeration completed Sep 6 00:27:27.871504 systemd[1]: Started systemd-networkd.service. Sep 6 00:27:27.871515 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 00:27:27.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:27.874657 systemd-networkd[1025]: eth0: Link UP Sep 6 00:27:27.874783 systemd-networkd[1025]: eth0: Gained carrier Sep 6 00:27:27.900513 systemd-networkd[1025]: eth0: DHCPv4 address 10.244.9.98/30, gateway 10.244.9.97 acquired from 10.244.9.97 Sep 6 00:27:27.908000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 00:27:27.908000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5653e116b3d0 a1=338ec a2=7f8469b67bc5 a3=5 items=110 ppid=1014 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:27.908000 audit: CWD cwd="/" Sep 6 00:27:27.908000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=1 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=2 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=3 name=(null) inode=16178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=4 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=5 name=(null) inode=16179 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=6 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=7 name=(null) inode=16180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=8 name=(null) inode=16180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=9 name=(null) inode=16181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=10 name=(null) inode=16180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=11 name=(null) inode=16182 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=12 name=(null) inode=16180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=13 name=(null) inode=16183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=14 name=(null) inode=16180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=15 name=(null) inode=16184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=16 name=(null) inode=16180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=17 name=(null) inode=16185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=18 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=19 name=(null) inode=16186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=20 name=(null) inode=16186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=21 name=(null) inode=16187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=22 name=(null) inode=16186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=23 name=(null) inode=16188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=24 name=(null) inode=16186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=25 name=(null) inode=16189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=26 name=(null) inode=16186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=27 name=(null) inode=16190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=28 name=(null) inode=16186 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=29 name=(null) inode=16191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=30 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=31 name=(null) inode=16192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=32 name=(null) inode=16192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=33 name=(null) inode=16193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=34 name=(null) inode=16192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=35 name=(null) inode=16194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=36 name=(null) inode=16192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=37 name=(null) inode=16195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=38 name=(null) inode=16192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=39 name=(null) inode=16196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=40 name=(null) inode=16192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=41 name=(null) inode=16197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=42 name=(null) inode=16177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=43 name=(null) inode=16198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=44 name=(null) inode=16198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=45 name=(null) inode=16199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=46 name=(null) inode=16198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=47 name=(null) inode=16200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=48 name=(null) inode=16198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=49 name=(null) inode=16201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=50 name=(null) inode=16198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=51 name=(null) inode=16202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=52 name=(null) inode=16198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=53 name=(null) inode=16203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=55 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=56 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=57 name=(null) inode=16205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=58 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=59 name=(null) inode=16206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=60 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=61 name=(null) inode=16207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=62 name=(null) inode=16207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=63 name=(null) inode=16208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=64 name=(null) inode=16207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=65 name=(null) inode=16209 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=66 name=(null) inode=16207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=67 name=(null) inode=16210 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=68 name=(null) inode=16207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=69 name=(null) inode=16211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=70 name=(null) inode=16207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=71 name=(null) inode=16212 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=72 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=73 name=(null) inode=16213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=74 name=(null) inode=16213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=75 name=(null) inode=16214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=76 name=(null) inode=16213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=77 name=(null) inode=16215 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=78 name=(null) inode=16213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=79 name=(null) inode=16216 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=80 name=(null) inode=16213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=81 name=(null) inode=16217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=82 name=(null) inode=16213 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=83 name=(null) inode=16218 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=84 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=85 name=(null) inode=16219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=86 name=(null) inode=16219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=87 name=(null) inode=16220 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=88 name=(null) inode=16219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=89 name=(null) inode=16221 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=90 name=(null) inode=16219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=91 name=(null) inode=16222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=92 name=(null) inode=16219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=93 name=(null) inode=16223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=94 name=(null) inode=16219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=95 name=(null) inode=16224 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=96 name=(null) inode=16204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=97 name=(null) inode=16225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=98 name=(null) inode=16225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=99 name=(null) inode=16226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=100 name=(null) inode=16225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=101 name=(null) inode=16227 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=102 name=(null) inode=16225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=103 name=(null) inode=16228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=104 name=(null) inode=16225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=105 name=(null) inode=16229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=106 name=(null) inode=16225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=107 name=(null) inode=16230 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PATH item=109 name=(null) inode=16231 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:27:27.908000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 00:27:27.975335 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Sep 6 00:27:27.988583 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Sep 6 00:27:27.988629 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 6 00:27:27.988886 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 6 00:27:28.147165 systemd[1]: Finished systemd-udev-settle.service. Sep 6 00:27:28.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.150266 systemd[1]: Starting lvm2-activation-early.service... Sep 6 00:27:28.175677 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:27:28.208067 systemd[1]: Finished lvm2-activation-early.service. Sep 6 00:27:28.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.209091 systemd[1]: Reached target cryptsetup.target. Sep 6 00:27:28.211575 systemd[1]: Starting lvm2-activation.service... Sep 6 00:27:28.217966 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 00:27:28.247047 systemd[1]: Finished lvm2-activation.service. Sep 6 00:27:28.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.247983 systemd[1]: Reached target local-fs-pre.target. Sep 6 00:27:28.248674 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 00:27:28.248724 systemd[1]: Reached target local-fs.target. Sep 6 00:27:28.249358 systemd[1]: Reached target machines.target. Sep 6 00:27:28.252185 systemd[1]: Starting ldconfig.service... Sep 6 00:27:28.253654 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:27:28.253724 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:28.255666 systemd[1]: Starting systemd-boot-update.service... Sep 6 00:27:28.259312 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 00:27:28.266419 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 00:27:28.270249 systemd[1]: Starting systemd-sysext.service... Sep 6 00:27:28.279256 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Sep 6 00:27:28.281148 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 00:27:28.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.290414 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 00:27:28.294828 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 00:27:28.346791 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 00:27:28.347071 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 00:27:28.404322 kernel: loop0: detected capacity change from 0 to 229808 Sep 6 00:27:28.528776 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 00:27:28.531183 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 00:27:28.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.540332 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 00:27:28.566725 kernel: loop1: detected capacity change from 0 to 229808 Sep 6 00:27:28.594058 (sd-sysext)[1058]: Using extensions 'kubernetes'. Sep 6 00:27:28.597839 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Sep 6 00:27:28.597839 systemd-fsck[1055]: /dev/vda1: 790 files, 120761/258078 clusters Sep 6 00:27:28.599035 (sd-sysext)[1058]: Merged extensions into '/usr'. Sep 6 00:27:28.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.600989 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 00:27:28.604988 systemd[1]: Mounting boot.mount... Sep 6 00:27:28.635417 systemd[1]: Mounted boot.mount. Sep 6 00:27:28.640703 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:27:28.646503 systemd[1]: Mounting usr-share-oem.mount... Sep 6 00:27:28.647467 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:27:28.649585 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:27:28.653582 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:27:28.656799 systemd[1]: Starting modprobe@loop.service... Sep 6 00:27:28.658717 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:27:28.658894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:28.659059 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:27:28.665264 systemd[1]: Mounted usr-share-oem.mount. Sep 6 00:27:28.666524 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:27:28.666777 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:27:28.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.670981 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:27:28.671193 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:27:28.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.672639 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:27:28.672837 systemd[1]: Finished modprobe@loop.service. Sep 6 00:27:28.676504 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:27:28.676879 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:27:28.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:28.677856 systemd[1]: Finished systemd-sysext.service. Sep 6 00:27:28.683545 systemd[1]: Starting ensure-sysext.service... Sep 6 00:27:28.687040 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 00:27:28.696416 systemd[1]: Reloading. Sep 6 00:27:28.712427 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 00:27:28.720520 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 00:27:28.727111 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 00:27:28.820132 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-09-06T00:27:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:27:28.820190 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-09-06T00:27:28Z" level=info msg="torcx already run" Sep 6 00:27:28.997487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:27:28.997523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:27:29.022346 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 00:27:29.041775 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:27:29.079861 systemd-networkd[1025]: eth0: Gained IPv6LL Sep 6 00:27:29.127000 audit: BPF prog-id=27 op=LOAD Sep 6 00:27:29.127000 audit: BPF prog-id=23 op=UNLOAD Sep 6 00:27:29.130000 audit: BPF prog-id=28 op=LOAD Sep 6 00:27:29.130000 audit: BPF prog-id=24 op=UNLOAD Sep 6 00:27:29.131000 audit: BPF prog-id=29 op=LOAD Sep 6 00:27:29.131000 audit: BPF prog-id=30 op=LOAD Sep 6 00:27:29.131000 audit: BPF prog-id=25 op=UNLOAD Sep 6 00:27:29.131000 audit: BPF prog-id=26 op=UNLOAD Sep 6 00:27:29.134000 audit: BPF prog-id=31 op=LOAD Sep 6 00:27:29.134000 audit: BPF prog-id=18 op=UNLOAD Sep 6 00:27:29.135000 audit: BPF prog-id=32 op=LOAD Sep 6 00:27:29.135000 audit: BPF prog-id=33 op=LOAD Sep 6 00:27:29.135000 audit: BPF prog-id=19 op=UNLOAD Sep 6 00:27:29.135000 audit: BPF prog-id=20 op=UNLOAD Sep 6 00:27:29.136000 audit: BPF prog-id=34 op=LOAD Sep 6 00:27:29.136000 audit: BPF prog-id=35 op=LOAD Sep 6 00:27:29.136000 audit: BPF prog-id=21 op=UNLOAD Sep 6 00:27:29.136000 audit: BPF prog-id=22 op=UNLOAD Sep 6 00:27:29.152004 systemd[1]: Finished ldconfig.service. Sep 6 00:27:29.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.153566 systemd[1]: Finished systemd-boot-update.service. Sep 6 00:27:29.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.156230 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 00:27:29.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.161908 systemd[1]: Starting audit-rules.service... Sep 6 00:27:29.164589 systemd[1]: Starting clean-ca-certificates.service... Sep 6 00:27:29.168066 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 00:27:29.170000 audit: BPF prog-id=36 op=LOAD Sep 6 00:27:29.176000 audit: BPF prog-id=37 op=LOAD Sep 6 00:27:29.172451 systemd[1]: Starting systemd-resolved.service... Sep 6 00:27:29.178447 systemd[1]: Starting systemd-timesyncd.service... Sep 6 00:27:29.181240 systemd[1]: Starting systemd-update-utmp.service... Sep 6 00:27:29.183965 systemd[1]: Finished clean-ca-certificates.service. Sep 6 00:27:29.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.187641 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:27:29.194000 audit[1139]: SYSTEM_BOOT pid=1139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.198336 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.201233 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:27:29.206537 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:27:29.209478 systemd[1]: Starting modprobe@loop.service... Sep 6 00:27:29.212432 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.212826 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:29.213118 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:27:29.215264 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:27:29.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.215546 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:27:29.217008 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:27:29.217214 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:27:29.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.218597 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:27:29.218778 systemd[1]: Finished modprobe@loop.service. Sep 6 00:27:29.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.220588 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:27:29.220819 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.225094 systemd[1]: Finished systemd-update-utmp.service. Sep 6 00:27:29.227577 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.230599 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:27:29.234949 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:27:29.237959 systemd[1]: Starting modprobe@loop.service... Sep 6 00:27:29.238755 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.238992 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:29.239231 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:27:29.240688 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:27:29.241154 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:27:29.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.242703 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:27:29.242898 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:27:29.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.244146 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:27:29.249728 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.253610 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 00:27:29.256218 systemd[1]: Starting modprobe@drm.service... Sep 6 00:27:29.258835 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 00:27:29.261532 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.261772 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:29.264553 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 00:27:29.265437 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 00:27:29.267239 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 00:27:29.267536 systemd[1]: Finished modprobe@loop.service. Sep 6 00:27:29.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.269032 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 00:27:29.269244 systemd[1]: Finished modprobe@drm.service. Sep 6 00:27:29.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.275161 systemd[1]: Finished ensure-sysext.service. Sep 6 00:27:29.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.277398 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 00:27:29.277603 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 00:27:29.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.278443 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 00:27:29.288406 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 00:27:29.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.290292 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 00:27:29.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.293520 systemd[1]: Starting systemd-update-done.service... Sep 6 00:27:29.294982 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 00:27:29.295318 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 00:27:29.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.315848 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.319870 systemd[1]: Finished systemd-update-done.service. Sep 6 00:27:29.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:29.345000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 00:27:29.345000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff19c15430 a2=420 a3=0 items=0 ppid=1133 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:29.345000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 00:27:29.346771 augenrules[1164]: No rules Sep 6 00:27:29.347892 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:27:29.347939 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 00:27:29.348857 systemd[1]: Finished audit-rules.service. Sep 6 00:27:29.358398 systemd[1]: Started systemd-timesyncd.service. Sep 6 00:27:29.359325 systemd[1]: Reached target time-set.target. Sep 6 00:27:29.370102 systemd-resolved[1136]: Positive Trust Anchors: Sep 6 00:27:29.370155 systemd-resolved[1136]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 00:27:29.370196 systemd-resolved[1136]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 00:27:29.378529 systemd-resolved[1136]: Using system hostname 'srv-vva2b.gb1.brightbox.com'. Sep 6 00:27:29.381239 systemd[1]: Started systemd-resolved.service. Sep 6 00:27:29.382048 systemd[1]: Reached target network.target. Sep 6 00:27:29.382682 systemd[1]: Reached target network-online.target. Sep 6 00:27:29.383328 systemd[1]: Reached target nss-lookup.target. Sep 6 00:27:29.383944 systemd[1]: Reached target sysinit.target. Sep 6 00:27:29.384666 systemd[1]: Started motdgen.path. Sep 6 00:27:29.385334 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 00:27:29.386346 systemd[1]: Started logrotate.timer. Sep 6 00:27:29.387034 systemd[1]: Started mdadm.timer. Sep 6 00:27:29.387650 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 00:27:29.388302 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 00:27:29.388341 systemd[1]: Reached target paths.target. Sep 6 00:27:29.388922 systemd[1]: Reached target timers.target. Sep 6 00:27:29.389999 systemd[1]: Listening on dbus.socket. Sep 6 00:27:29.392516 systemd[1]: Starting docker.socket... Sep 6 00:27:29.397037 systemd[1]: Listening on sshd.socket. Sep 6 00:27:29.397850 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:29.398538 systemd[1]: Listening on docker.socket. Sep 6 00:27:29.399270 systemd[1]: Reached target sockets.target. Sep 6 00:27:29.399882 systemd[1]: Reached target basic.target. Sep 6 00:27:29.400556 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.400609 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 00:27:29.402327 systemd[1]: Starting containerd.service... Sep 6 00:27:29.406061 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 00:27:29.408464 systemd[1]: Starting dbus.service... Sep 6 00:27:29.413184 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 00:27:29.421973 systemd[1]: Starting extend-filesystems.service... Sep 6 00:27:29.422986 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 00:27:29.426829 systemd[1]: Starting kubelet.service... Sep 6 00:27:29.430846 systemd[1]: Starting motdgen.service... Sep 6 00:27:29.436522 systemd[1]: Starting prepare-helm.service... Sep 6 00:27:29.441568 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 00:27:29.445543 systemd[1]: Starting sshd-keygen.service... Sep 6 00:27:29.449308 jq[1177]: false Sep 6 00:27:29.451932 systemd[1]: Starting systemd-logind.service... Sep 6 00:27:29.452717 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 00:27:29.452871 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 00:27:29.453723 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 00:27:29.455376 systemd[1]: Starting update-engine.service... Sep 6 00:27:29.460475 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 00:27:29.467608 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 00:27:29.467918 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 00:27:29.498922 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 00:27:29.499229 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 00:27:29.501167 jq[1189]: true Sep 6 00:27:29.511590 tar[1195]: linux-amd64/LICENSE Sep 6 00:27:29.511991 tar[1195]: linux-amd64/helm Sep 6 00:27:29.519027 extend-filesystems[1178]: Found loop1 Sep 6 00:27:29.528852 extend-filesystems[1178]: Found vda Sep 6 00:27:29.531383 dbus-daemon[1174]: [system] SELinux support is enabled Sep 6 00:27:29.531643 systemd[1]: Started dbus.service. Sep 6 00:27:29.535063 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 00:27:29.535126 systemd[1]: Reached target system-config.target. Sep 6 00:27:29.535836 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 00:27:29.535876 systemd[1]: Reached target user-config.target. Sep 6 00:27:29.537260 dbus-daemon[1174]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1025 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 00:27:29.537589 extend-filesystems[1178]: Found vda1 Sep 6 00:27:29.538431 extend-filesystems[1178]: Found vda2 Sep 6 00:27:29.540764 extend-filesystems[1178]: Found vda3 Sep 6 00:27:29.549497 systemd[1]: Starting systemd-hostnamed.service... Sep 6 00:27:29.551816 jq[1204]: true Sep 6 00:27:29.562341 extend-filesystems[1178]: Found usr Sep 6 00:27:29.562341 extend-filesystems[1178]: Found vda4 Sep 6 00:27:29.562341 extend-filesystems[1178]: Found vda6 Sep 6 00:27:29.562341 extend-filesystems[1178]: Found vda7 Sep 6 00:27:29.562341 extend-filesystems[1178]: Found vda9 Sep 6 00:27:29.562341 extend-filesystems[1178]: Checking size of /dev/vda9 Sep 6 00:27:29.568990 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 00:27:29.569249 systemd[1]: Finished motdgen.service. Sep 6 00:27:29.619476 extend-filesystems[1178]: Resized partition /dev/vda9 Sep 6 00:27:29.659957 extend-filesystems[1227]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 00:27:29.674008 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Sep 6 00:27:29.721427 systemd-logind[1185]: Watching system buttons on /dev/input/event2 (Power Button) Sep 6 00:27:29.721608 systemd-logind[1185]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 00:27:29.723919 systemd-logind[1185]: New seat seat0. Sep 6 00:27:29.729049 systemd[1]: Started systemd-logind.service. Sep 6 00:27:29.765734 update_engine[1188]: I0906 00:27:29.743868 1188 main.cc:92] Flatcar Update Engine starting Sep 6 00:27:30.529607 systemd-resolved[1136]: Clock change detected. Flushing caches. Sep 6 00:27:30.553460 systemd-timesyncd[1138]: Contacted time server 91.109.118.94:123 (0.flatcar.pool.ntp.org). Sep 6 00:27:30.553563 systemd-timesyncd[1138]: Initial clock synchronization to Sat 2025-09-06 00:27:30.529513 UTC. Sep 6 00:27:30.561117 env[1201]: time="2025-09-06T00:27:30.558429818Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 00:27:30.570298 systemd[1]: Started systemd-hostnamed.service. Sep 6 00:27:30.768599 update_engine[1188]: I0906 00:27:30.618070 1188 update_check_scheduler.cc:74] Next update check in 5m5s Sep 6 00:27:30.570007 dbus-daemon[1174]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 00:27:30.768782 env[1201]: time="2025-09-06T00:27:30.609420177Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 00:27:30.768782 env[1201]: time="2025-09-06T00:27:30.767787678Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:27:30.596154 systemd[1]: Starting polkit.service... Sep 6 00:27:30.570543 dbus-daemon[1174]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1206 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 00:27:30.612757 systemd[1]: Started update-engine.service. Sep 6 00:27:30.632705 polkitd[1235]: Started polkitd version 121 Sep 6 00:27:30.616677 systemd[1]: Started locksmithd.service. Sep 6 00:27:30.687796 polkitd[1235]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 00:27:30.656901 systemd-networkd[1025]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:258:24:19ff:fef4:962/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:258:24:19ff:fef4:962/64 assigned by NDisc. Sep 6 00:27:30.764542 polkitd[1235]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 00:27:30.656909 systemd-networkd[1025]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.772715325Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.772763462Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.773075311Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.773142551Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.773164523Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.773183222Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.773348661Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.773770878Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.774147492Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 00:27:30.787367 env[1201]: time="2025-09-06T00:27:30.774177437Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 00:27:30.774802 polkitd[1235]: Finished loading, compiling and executing 2 rules Sep 6 00:27:30.776614 systemd[1]: Started polkit.service. Sep 6 00:27:30.788200 env[1201]: time="2025-09-06T00:27:30.778068701Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 00:27:30.788200 env[1201]: time="2025-09-06T00:27:30.778126073Z" level=info msg="metadata content store policy set" policy=shared Sep 6 00:27:30.776359 dbus-daemon[1174]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 00:27:30.778395 polkitd[1235]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 00:27:30.804649 systemd[1]: Created slice system-sshd.slice. Sep 6 00:27:30.817494 systemd-hostnamed[1206]: Hostname set to (static) Sep 6 00:27:30.835659 bash[1231]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:27:30.837002 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.858870516Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859020770Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859046631Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859148088Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859197436Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859221641Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859243798Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859295079Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859321746Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859364276Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859386756Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859433535Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859773314Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 00:27:30.860854 env[1201]: time="2025-09-06T00:27:30.859994130Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 00:27:30.861620 env[1201]: time="2025-09-06T00:27:30.860478486Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 00:27:30.861620 env[1201]: time="2025-09-06T00:27:30.860553658Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.861620 env[1201]: time="2025-09-06T00:27:30.860600258Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 00:27:30.861620 env[1201]: time="2025-09-06T00:27:30.860712411Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.861620 env[1201]: time="2025-09-06T00:27:30.860738032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.860812854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.861938414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862001286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862025187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862064637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862115629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862143234Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862451719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862479993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862500192Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862538654Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862569992Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862588915Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 00:27:30.862936 env[1201]: time="2025-09-06T00:27:30.862659971Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 00:27:30.863984 env[1201]: time="2025-09-06T00:27:30.862746899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 00:27:30.864673 env[1201]: time="2025-09-06T00:27:30.863467036Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 00:27:30.864673 env[1201]: time="2025-09-06T00:27:30.864187282Z" level=info msg="Connect containerd service" Sep 6 00:27:30.864673 env[1201]: time="2025-09-06T00:27:30.864283788Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 00:27:30.867041 env[1201]: time="2025-09-06T00:27:30.866767531Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:27:30.867327 env[1201]: time="2025-09-06T00:27:30.867263156Z" level=info msg="Start subscribing containerd event" Sep 6 00:27:30.867700 env[1201]: time="2025-09-06T00:27:30.867661856Z" level=info msg="Start recovering state" Sep 6 00:27:30.867836 env[1201]: time="2025-09-06T00:27:30.867803530Z" level=info msg="Start event monitor" Sep 6 00:27:30.867924 env[1201]: time="2025-09-06T00:27:30.867853142Z" level=info msg="Start snapshots syncer" Sep 6 00:27:30.867977 env[1201]: time="2025-09-06T00:27:30.867873309Z" level=info msg="Start cni network conf syncer for default" Sep 6 00:27:30.867977 env[1201]: time="2025-09-06T00:27:30.867952335Z" level=info msg="Start streaming server" Sep 6 00:27:30.868477 env[1201]: time="2025-09-06T00:27:30.868446627Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 00:27:30.868563 env[1201]: time="2025-09-06T00:27:30.868535274Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 00:27:30.870310 env[1201]: time="2025-09-06T00:27:30.868645439Z" level=info msg="containerd successfully booted in 0.373441s" Sep 6 00:27:30.868744 systemd[1]: Started containerd.service. Sep 6 00:27:31.129301 locksmithd[1236]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 00:27:31.186272 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Sep 6 00:27:31.220369 extend-filesystems[1227]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 6 00:27:31.220369 extend-filesystems[1227]: old_desc_blocks = 1, new_desc_blocks = 8 Sep 6 00:27:31.220369 extend-filesystems[1227]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Sep 6 00:27:31.223337 extend-filesystems[1178]: Resized filesystem in /dev/vda9 Sep 6 00:27:31.225856 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 00:27:31.226207 systemd[1]: Finished extend-filesystems.service. Sep 6 00:27:31.926365 tar[1195]: linux-amd64/README.md Sep 6 00:27:31.942856 systemd[1]: Finished prepare-helm.service. Sep 6 00:27:32.166002 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 00:27:32.198915 systemd[1]: Finished sshd-keygen.service. Sep 6 00:27:32.202321 systemd[1]: Starting issuegen.service... Sep 6 00:27:32.205073 systemd[1]: Started sshd@0-10.244.9.98:22-139.178.89.65:38150.service. Sep 6 00:27:32.212757 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 00:27:32.213055 systemd[1]: Finished issuegen.service. Sep 6 00:27:32.216555 systemd[1]: Starting systemd-user-sessions.service... Sep 6 00:27:32.286877 systemd[1]: Finished systemd-user-sessions.service. Sep 6 00:27:32.290043 systemd[1]: Started getty@tty1.service. Sep 6 00:27:32.293384 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 00:27:32.294410 systemd[1]: Reached target getty.target. Sep 6 00:27:32.447640 systemd[1]: Started kubelet.service. Sep 6 00:27:33.158726 kubelet[1271]: E0906 00:27:33.158629 1271 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:27:33.161115 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:27:33.161417 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:27:33.162050 systemd[1]: kubelet.service: Consumed 1.165s CPU time. Sep 6 00:27:33.199039 sshd[1262]: Accepted publickey for core from 139.178.89.65 port 38150 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:33.202398 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:33.220454 systemd[1]: Created slice user-500.slice. Sep 6 00:27:33.223877 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 00:27:33.230214 systemd-logind[1185]: New session 1 of user core. Sep 6 00:27:33.241598 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 00:27:33.248815 systemd[1]: Starting user@500.service... Sep 6 00:27:33.254898 (systemd)[1279]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:33.361962 systemd[1279]: Queued start job for default target default.target. Sep 6 00:27:33.363699 systemd[1279]: Reached target paths.target. Sep 6 00:27:33.363744 systemd[1279]: Reached target sockets.target. Sep 6 00:27:33.363766 systemd[1279]: Reached target timers.target. Sep 6 00:27:33.363787 systemd[1279]: Reached target basic.target. Sep 6 00:27:33.363875 systemd[1279]: Reached target default.target. Sep 6 00:27:33.363929 systemd[1279]: Startup finished in 98ms. Sep 6 00:27:33.363990 systemd[1]: Started user@500.service. Sep 6 00:27:33.366614 systemd[1]: Started session-1.scope. Sep 6 00:27:34.075578 systemd[1]: Started sshd@1-10.244.9.98:22-139.178.89.65:38162.service. Sep 6 00:27:34.979403 sshd[1288]: Accepted publickey for core from 139.178.89.65 port 38162 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:34.981467 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:34.988607 systemd-logind[1185]: New session 2 of user core. Sep 6 00:27:34.989440 systemd[1]: Started session-2.scope. Sep 6 00:27:35.604194 sshd[1288]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:35.608638 systemd[1]: sshd@1-10.244.9.98:22-139.178.89.65:38162.service: Deactivated successfully. Sep 6 00:27:35.609630 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 00:27:35.610680 systemd-logind[1185]: Session 2 logged out. Waiting for processes to exit. Sep 6 00:27:35.612684 systemd-logind[1185]: Removed session 2. Sep 6 00:27:35.752588 systemd[1]: Started sshd@2-10.244.9.98:22-139.178.89.65:38178.service. Sep 6 00:27:36.654241 sshd[1294]: Accepted publickey for core from 139.178.89.65 port 38178 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:36.656218 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:36.663609 systemd[1]: Started session-3.scope. Sep 6 00:27:36.666214 systemd-logind[1185]: New session 3 of user core. Sep 6 00:27:37.266912 coreos-metadata[1173]: Sep 06 00:27:37.266 WARN failed to locate config-drive, using the metadata service API instead Sep 6 00:27:37.280482 sshd[1294]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:37.286285 systemd[1]: sshd@2-10.244.9.98:22-139.178.89.65:38178.service: Deactivated successfully. Sep 6 00:27:37.287432 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 00:27:37.289276 systemd-logind[1185]: Session 3 logged out. Waiting for processes to exit. Sep 6 00:27:37.290690 systemd-logind[1185]: Removed session 3. Sep 6 00:27:37.340247 coreos-metadata[1173]: Sep 06 00:27:37.340 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Sep 6 00:27:37.369137 coreos-metadata[1173]: Sep 06 00:27:37.369 INFO Fetch successful Sep 6 00:27:37.369558 coreos-metadata[1173]: Sep 06 00:27:37.369 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 00:27:37.403919 coreos-metadata[1173]: Sep 06 00:27:37.403 INFO Fetch successful Sep 6 00:27:37.407446 unknown[1173]: wrote ssh authorized keys file for user: core Sep 6 00:27:37.421253 update-ssh-keys[1301]: Updated "/home/core/.ssh/authorized_keys" Sep 6 00:27:37.421874 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 00:27:37.422433 systemd[1]: Reached target multi-user.target. Sep 6 00:27:37.425255 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 00:27:37.437915 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 00:27:37.438211 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 00:27:37.438457 systemd[1]: Startup finished in 1.240s (kernel) + 8.630s (initrd) + 14.344s (userspace) = 24.214s. Sep 6 00:27:43.412961 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 00:27:43.413330 systemd[1]: Stopped kubelet.service. Sep 6 00:27:43.413408 systemd[1]: kubelet.service: Consumed 1.165s CPU time. Sep 6 00:27:43.416037 systemd[1]: Starting kubelet.service... Sep 6 00:27:43.571143 systemd[1]: Started kubelet.service. Sep 6 00:27:43.696920 kubelet[1307]: E0906 00:27:43.696354 1307 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:27:43.701121 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:27:43.701342 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:27:47.430368 systemd[1]: Started sshd@3-10.244.9.98:22-139.178.89.65:44732.service. Sep 6 00:27:48.330924 sshd[1313]: Accepted publickey for core from 139.178.89.65 port 44732 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:48.333922 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:48.341902 systemd-logind[1185]: New session 4 of user core. Sep 6 00:27:48.342719 systemd[1]: Started session-4.scope. Sep 6 00:27:48.960844 sshd[1313]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:48.965626 systemd-logind[1185]: Session 4 logged out. Waiting for processes to exit. Sep 6 00:27:48.966231 systemd[1]: sshd@3-10.244.9.98:22-139.178.89.65:44732.service: Deactivated successfully. Sep 6 00:27:48.967803 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 00:27:48.969219 systemd-logind[1185]: Removed session 4. Sep 6 00:27:49.109270 systemd[1]: Started sshd@4-10.244.9.98:22-139.178.89.65:44744.service. Sep 6 00:27:50.014678 sshd[1319]: Accepted publickey for core from 139.178.89.65 port 44744 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:50.016714 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:50.024022 systemd-logind[1185]: New session 5 of user core. Sep 6 00:27:50.024776 systemd[1]: Started session-5.scope. Sep 6 00:27:50.636448 sshd[1319]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:50.640432 systemd[1]: sshd@4-10.244.9.98:22-139.178.89.65:44744.service: Deactivated successfully. Sep 6 00:27:50.641476 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 00:27:50.643122 systemd-logind[1185]: Session 5 logged out. Waiting for processes to exit. Sep 6 00:27:50.644450 systemd-logind[1185]: Removed session 5. Sep 6 00:27:50.787262 systemd[1]: Started sshd@5-10.244.9.98:22-139.178.89.65:36564.service. Sep 6 00:27:51.687131 sshd[1325]: Accepted publickey for core from 139.178.89.65 port 36564 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:51.689739 sshd[1325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:51.696917 systemd-logind[1185]: New session 6 of user core. Sep 6 00:27:51.696935 systemd[1]: Started session-6.scope. Sep 6 00:27:52.318394 sshd[1325]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:52.323044 systemd[1]: sshd@5-10.244.9.98:22-139.178.89.65:36564.service: Deactivated successfully. Sep 6 00:27:52.323936 systemd-logind[1185]: Session 6 logged out. Waiting for processes to exit. Sep 6 00:27:52.324157 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 00:27:52.326041 systemd-logind[1185]: Removed session 6. Sep 6 00:27:52.467766 systemd[1]: Started sshd@6-10.244.9.98:22-139.178.89.65:36568.service. Sep 6 00:27:53.368234 sshd[1331]: Accepted publickey for core from 139.178.89.65 port 36568 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:53.370162 sshd[1331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:53.377654 systemd-logind[1185]: New session 7 of user core. Sep 6 00:27:53.378467 systemd[1]: Started session-7.scope. Sep 6 00:27:53.874739 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 00:27:53.875914 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:27:53.878933 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 00:27:53.879425 systemd[1]: Stopped kubelet.service. Sep 6 00:27:53.883274 systemd[1]: Starting kubelet.service... Sep 6 00:27:53.890236 dbus-daemon[1174]: \xd0ͽ&aU: received setenforce notice (enforcing=1015200272) Sep 6 00:27:53.894242 sudo[1334]: pam_unix(sudo:session): session closed for user root Sep 6 00:27:54.041325 sshd[1331]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:54.045978 systemd[1]: sshd@6-10.244.9.98:22-139.178.89.65:36568.service: Deactivated successfully. Sep 6 00:27:54.047144 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 00:27:54.048073 systemd-logind[1185]: Session 7 logged out. Waiting for processes to exit. Sep 6 00:27:54.049722 systemd-logind[1185]: Removed session 7. Sep 6 00:27:54.091633 systemd[1]: Started kubelet.service. Sep 6 00:27:54.180319 kubelet[1341]: E0906 00:27:54.180119 1341 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:27:54.182908 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:27:54.183167 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:27:54.208482 systemd[1]: Started sshd@7-10.244.9.98:22-139.178.89.65:36576.service. Sep 6 00:27:55.166729 sshd[1348]: Accepted publickey for core from 139.178.89.65 port 36576 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:55.169987 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:55.177731 systemd-logind[1185]: New session 8 of user core. Sep 6 00:27:55.178736 systemd[1]: Started session-8.scope. Sep 6 00:27:55.677325 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 00:27:55.677738 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:27:55.682576 sudo[1352]: pam_unix(sudo:session): session closed for user root Sep 6 00:27:55.690190 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 00:27:55.691035 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:27:55.704790 systemd[1]: Stopping audit-rules.service... Sep 6 00:27:55.705000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:27:55.708246 kernel: kauditd_printk_skb: 208 callbacks suppressed Sep 6 00:27:55.708358 kernel: audit: type=1305 audit(1757118475.705:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 00:27:55.708809 auditctl[1355]: No rules Sep 6 00:27:55.709698 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 00:27:55.709962 systemd[1]: Stopped audit-rules.service. Sep 6 00:27:55.712664 systemd[1]: Starting audit-rules.service... Sep 6 00:27:55.722280 kernel: audit: type=1300 audit(1757118475.705:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4f4add80 a2=420 a3=0 items=0 ppid=1 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.705000 audit[1355]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4f4add80 a2=420 a3=0 items=0 ppid=1 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:55.705000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:27:55.730237 kernel: audit: type=1327 audit(1757118475.705:217): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 00:27:55.730353 kernel: audit: type=1131 audit(1757118475.707:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.743353 augenrules[1372]: No rules Sep 6 00:27:55.744792 systemd[1]: Finished audit-rules.service. Sep 6 00:27:55.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.745851 sudo[1351]: pam_unix(sudo:session): session closed for user root Sep 6 00:27:55.752164 kernel: audit: type=1130 audit(1757118475.744:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.752268 kernel: audit: type=1106 audit(1757118475.744:220): pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.744000 audit[1351]: USER_END pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.744000 audit[1351]: CRED_DISP pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.765180 kernel: audit: type=1104 audit(1757118475.744:221): pid=1351 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.906474 sshd[1348]: pam_unix(sshd:session): session closed for user core Sep 6 00:27:55.906000 audit[1348]: USER_END pid=1348 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:55.916140 kernel: audit: type=1106 audit(1757118475.906:222): pid=1348 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:55.916197 systemd[1]: sshd@7-10.244.9.98:22-139.178.89.65:36576.service: Deactivated successfully. Sep 6 00:27:55.907000 audit[1348]: CRED_DISP pid=1348 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:55.917260 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 00:27:55.923917 kernel: audit: type=1104 audit(1757118475.907:223): pid=1348 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:55.924054 kernel: audit: type=1131 audit(1757118475.915:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.9.98:22-139.178.89.65:36576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.9.98:22-139.178.89.65:36576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:55.929411 systemd-logind[1185]: Session 8 logged out. Waiting for processes to exit. Sep 6 00:27:55.931462 systemd-logind[1185]: Removed session 8. Sep 6 00:27:56.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.9.98:22-139.178.89.65:36592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:56.043194 systemd[1]: Started sshd@8-10.244.9.98:22-139.178.89.65:36592.service. Sep 6 00:27:56.937000 audit[1378]: USER_ACCT pid=1378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:56.939007 sshd[1378]: Accepted publickey for core from 139.178.89.65 port 36592 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:27:56.939000 audit[1378]: CRED_ACQ pid=1378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:56.939000 audit[1378]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95ae1530 a2=3 a3=0 items=0 ppid=1 pid=1378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:56.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:27:56.941484 sshd[1378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:27:56.949025 systemd-logind[1185]: New session 9 of user core. Sep 6 00:27:56.949420 systemd[1]: Started session-9.scope. Sep 6 00:27:56.957000 audit[1378]: USER_START pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:56.959000 audit[1380]: CRED_ACQ pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:27:57.421000 audit[1381]: USER_ACCT pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:57.421000 audit[1381]: CRED_REFR pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:57.422366 sudo[1381]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 00:27:57.422762 sudo[1381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 00:27:57.424000 audit[1381]: USER_START pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:27:57.474254 systemd[1]: Starting docker.service... Sep 6 00:27:57.557749 env[1391]: time="2025-09-06T00:27:57.556628890Z" level=info msg="Starting up" Sep 6 00:27:57.560432 env[1391]: time="2025-09-06T00:27:57.560386552Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 6 00:27:57.560655 env[1391]: time="2025-09-06T00:27:57.560627117Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 6 00:27:57.560811 env[1391]: time="2025-09-06T00:27:57.560776231Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 6 00:27:57.560940 env[1391]: time="2025-09-06T00:27:57.560910372Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 6 00:27:57.566456 env[1391]: time="2025-09-06T00:27:57.566034827Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 6 00:27:57.566456 env[1391]: time="2025-09-06T00:27:57.566059405Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 6 00:27:57.566456 env[1391]: time="2025-09-06T00:27:57.566113282Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 6 00:27:57.566456 env[1391]: time="2025-09-06T00:27:57.566133536Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 6 00:27:57.582330 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1786014606-merged.mount: Deactivated successfully. Sep 6 00:27:57.656800 env[1391]: time="2025-09-06T00:27:57.656739474Z" level=info msg="Loading containers: start." Sep 6 00:27:57.763000 audit[1424]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.763000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe163bc390 a2=0 a3=7ffe163bc37c items=0 ppid=1391 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 6 00:27:57.768000 audit[1426]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.768000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffec995efd0 a2=0 a3=7ffec995efbc items=0 ppid=1391 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 6 00:27:57.771000 audit[1428]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.771000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff85f19510 a2=0 a3=7fff85f194fc items=0 ppid=1391 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 6 00:27:57.776000 audit[1430]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.776000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd57b28070 a2=0 a3=7ffd57b2805c items=0 ppid=1391 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 6 00:27:57.781000 audit[1432]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.781000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff075b65a0 a2=0 a3=7fff075b658c items=0 ppid=1391 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 6 00:27:57.804000 audit[1437]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.804000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4dac57f0 a2=0 a3=7ffc4dac57dc items=0 ppid=1391 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 6 00:27:57.849000 audit[1439]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.849000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe795bb8c0 a2=0 a3=7ffe795bb8ac items=0 ppid=1391 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 6 00:27:57.853000 audit[1441]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.853000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffca3635460 a2=0 a3=7ffca363544c items=0 ppid=1391 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.853000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 6 00:27:57.856000 audit[1443]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.856000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdb92b6c00 a2=0 a3=7ffdb92b6bec items=0 ppid=1391 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.856000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 00:27:57.870000 audit[1447]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.870000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcaf3e5ab0 a2=0 a3=7ffcaf3e5a9c items=0 ppid=1391 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 6 00:27:57.876000 audit[1448]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.876000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc9fe2e8d0 a2=0 a3=7ffc9fe2e8bc items=0 ppid=1391 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 00:27:57.894285 kernel: Initializing XFRM netlink socket Sep 6 00:27:57.942336 env[1391]: time="2025-09-06T00:27:57.942268087Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 6 00:27:57.985000 audit[1456]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.985000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff1ecef8f0 a2=0 a3=7fff1ecef8dc items=0 ppid=1391 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.985000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 6 00:27:57.996000 audit[1459]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:57.996000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd7e8bb940 a2=0 a3=7ffd7e8bb92c items=0 ppid=1391 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:57.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 6 00:27:58.001000 audit[1462]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.001000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffb2da86f0 a2=0 a3=7fffb2da86dc items=0 ppid=1391 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 6 00:27:58.004000 audit[1464]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.004000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe43f3b830 a2=0 a3=7ffe43f3b81c items=0 ppid=1391 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 6 00:27:58.008000 audit[1466]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.008000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe5d55d360 a2=0 a3=7ffe5d55d34c items=0 ppid=1391 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.008000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 6 00:27:58.012000 audit[1468]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.012000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd8fff46e0 a2=0 a3=7ffd8fff46cc items=0 ppid=1391 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 6 00:27:58.015000 audit[1470]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.015000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff7f8e6c10 a2=0 a3=7fff7f8e6bfc items=0 ppid=1391 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 6 00:27:58.028000 audit[1473]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.028000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdcbafa150 a2=0 a3=7ffdcbafa13c items=0 ppid=1391 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.028000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 6 00:27:58.032000 audit[1475]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.032000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffbe8ba680 a2=0 a3=7fffbe8ba66c items=0 ppid=1391 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 6 00:27:58.035000 audit[1477]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.035000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd3de78b80 a2=0 a3=7ffd3de78b6c items=0 ppid=1391 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.035000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 6 00:27:58.038000 audit[1479]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.038000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6d968150 a2=0 a3=7ffc6d96813c items=0 ppid=1391 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 6 00:27:58.041155 systemd-networkd[1025]: docker0: Link UP Sep 6 00:27:58.078000 audit[1483]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.078000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd67737d0 a2=0 a3=7ffcd67737bc items=0 ppid=1391 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 6 00:27:58.084000 audit[1484]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:27:58.084000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc93835f60 a2=0 a3=7ffc93835f4c items=0 ppid=1391 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:27:58.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 00:27:58.086986 env[1391]: time="2025-09-06T00:27:58.086941464Z" level=info msg="Loading containers: done." Sep 6 00:27:58.124497 env[1391]: time="2025-09-06T00:27:58.123933537Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 6 00:27:58.124497 env[1391]: time="2025-09-06T00:27:58.124260836Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 6 00:27:58.125397 env[1391]: time="2025-09-06T00:27:58.124988815Z" level=info msg="Daemon has completed initialization" Sep 6 00:27:58.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:27:58.146684 systemd[1]: Started docker.service. Sep 6 00:27:58.158137 env[1391]: time="2025-09-06T00:27:58.158029023Z" level=info msg="API listen on /run/docker.sock" Sep 6 00:27:59.609616 env[1201]: time="2025-09-06T00:27:59.609377916Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.4\"" Sep 6 00:28:00.718710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3572604900.mount: Deactivated successfully. Sep 6 00:28:00.869063 kernel: kauditd_printk_skb: 84 callbacks suppressed Sep 6 00:28:00.870891 kernel: audit: type=1131 audit(1757118480.860:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:00.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:00.861113 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 00:28:00.880000 audit: BPF prog-id=43 op=UNLOAD Sep 6 00:28:00.880000 audit: BPF prog-id=42 op=UNLOAD Sep 6 00:28:00.884762 kernel: audit: type=1334 audit(1757118480.880:260): prog-id=43 op=UNLOAD Sep 6 00:28:00.884859 kernel: audit: type=1334 audit(1757118480.880:261): prog-id=42 op=UNLOAD Sep 6 00:28:00.884919 kernel: audit: type=1334 audit(1757118480.880:262): prog-id=41 op=UNLOAD Sep 6 00:28:00.880000 audit: BPF prog-id=41 op=UNLOAD Sep 6 00:28:03.039037 env[1201]: time="2025-09-06T00:28:03.038936981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:03.041559 env[1201]: time="2025-09-06T00:28:03.041516075Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1f41885d0a91155d5a5e670b2862eed338c7f12b0e8a5bbc88b1ab4a2d505ae8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:03.044157 env[1201]: time="2025-09-06T00:28:03.044061750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:03.046617 env[1201]: time="2025-09-06T00:28:03.046576104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0d441d0d347145b3f02f20cb313239cdae86067643d7f70803fab8bac2d28876,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:03.047785 env[1201]: time="2025-09-06T00:28:03.047726063Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.4\" returns image reference \"sha256:1f41885d0a91155d5a5e670b2862eed338c7f12b0e8a5bbc88b1ab4a2d505ae8\"" Sep 6 00:28:03.050204 env[1201]: time="2025-09-06T00:28:03.050165191Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.4\"" Sep 6 00:28:04.220694 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 00:28:04.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:04.221131 systemd[1]: Stopped kubelet.service. Sep 6 00:28:04.235060 kernel: audit: type=1130 audit(1757118484.220:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:04.235242 kernel: audit: type=1131 audit(1757118484.220:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:04.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:04.229749 systemd[1]: Starting kubelet.service... Sep 6 00:28:04.430187 kernel: audit: type=1130 audit(1757118484.422:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:04.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:04.423616 systemd[1]: Started kubelet.service. Sep 6 00:28:04.601839 kubelet[1526]: E0906 00:28:04.601105 1526 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:28:04.611272 kernel: audit: type=1131 audit(1757118484.603:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:28:04.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:28:04.604429 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:28:04.604678 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:28:05.800508 env[1201]: time="2025-09-06T00:28:05.799311426Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:05.805853 env[1201]: time="2025-09-06T00:28:05.805782343Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:358ab71c1a1ea4846ad0b3dff0d9db6b124236b64bc8a6b79dc874f65dc0d492,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:05.809409 env[1201]: time="2025-09-06T00:28:05.809332963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:05.815637 env[1201]: time="2025-09-06T00:28:05.815585460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:bd22c2af2f30a8f818568b4d5fe131098fdd38267e9e07872cfc33e8f5876bc3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:05.816984 env[1201]: time="2025-09-06T00:28:05.816932009Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.4\" returns image reference \"sha256:358ab71c1a1ea4846ad0b3dff0d9db6b124236b64bc8a6b79dc874f65dc0d492\"" Sep 6 00:28:05.818268 env[1201]: time="2025-09-06T00:28:05.818232399Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.4\"" Sep 6 00:28:08.307551 env[1201]: time="2025-09-06T00:28:08.307344003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:08.311277 env[1201]: time="2025-09-06T00:28:08.311222556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab4ad8a84c3c69c18494ef32fa087b32f7c44d71e6acba463d2c7dda798c3d66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:08.316182 env[1201]: time="2025-09-06T00:28:08.316130124Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:08.320522 env[1201]: time="2025-09-06T00:28:08.320427154Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:71533e5a960e2955a54164905e92dac516ec874a23e0bf31304db82650101a4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:08.322957 env[1201]: time="2025-09-06T00:28:08.321771200Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.4\" returns image reference \"sha256:ab4ad8a84c3c69c18494ef32fa087b32f7c44d71e6acba463d2c7dda798c3d66\"" Sep 6 00:28:08.324770 env[1201]: time="2025-09-06T00:28:08.324711670Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\"" Sep 6 00:28:10.082882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3989447545.mount: Deactivated successfully. Sep 6 00:28:11.364895 env[1201]: time="2025-09-06T00:28:11.364768817Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:11.368251 env[1201]: time="2025-09-06T00:28:11.368211109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1b2ea5e018dbbbd2efb8e5c540a6d3c463d77f250d3904429402ee057f09c64e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:11.369868 env[1201]: time="2025-09-06T00:28:11.369825292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:11.373298 env[1201]: time="2025-09-06T00:28:11.372282600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bb04e9247da3aaeb96406b4d530a79fc865695b6807353dd1a28871df0d7f837,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:11.373455 env[1201]: time="2025-09-06T00:28:11.373268624Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.4\" returns image reference \"sha256:1b2ea5e018dbbbd2efb8e5c540a6d3c463d77f250d3904429402ee057f09c64e\"" Sep 6 00:28:11.376299 env[1201]: time="2025-09-06T00:28:11.376244153Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Sep 6 00:28:12.193147 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3704003736.mount: Deactivated successfully. Sep 6 00:28:14.215706 env[1201]: time="2025-09-06T00:28:14.214354337Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:14.219161 env[1201]: time="2025-09-06T00:28:14.218951483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:14.222136 env[1201]: time="2025-09-06T00:28:14.222073261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:14.226746 env[1201]: time="2025-09-06T00:28:14.226697527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:14.228190 env[1201]: time="2025-09-06T00:28:14.228117747Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Sep 6 00:28:14.230909 env[1201]: time="2025-09-06T00:28:14.230797726Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 6 00:28:14.720996 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 6 00:28:14.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:14.721611 systemd[1]: Stopped kubelet.service. Sep 6 00:28:14.732175 kernel: audit: type=1130 audit(1757118494.720:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:14.732497 kernel: audit: type=1131 audit(1757118494.720:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:14.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:14.733625 systemd[1]: Starting kubelet.service... Sep 6 00:28:14.930591 systemd[1]: Started kubelet.service. Sep 6 00:28:14.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:14.937222 kernel: audit: type=1130 audit(1757118494.930:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:15.033783 kubelet[1536]: E0906 00:28:15.032856 1536 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:28:15.039699 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:28:15.039966 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:28:15.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:28:15.057485 kernel: audit: type=1131 audit(1757118495.039:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:28:15.185857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount735702172.mount: Deactivated successfully. Sep 6 00:28:15.194553 env[1201]: time="2025-09-06T00:28:15.194400609Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:15.198205 env[1201]: time="2025-09-06T00:28:15.198152513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:15.201681 env[1201]: time="2025-09-06T00:28:15.200609454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:15.202884 env[1201]: time="2025-09-06T00:28:15.202847883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:15.204063 env[1201]: time="2025-09-06T00:28:15.204008050Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 6 00:28:15.205683 env[1201]: time="2025-09-06T00:28:15.205645201Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Sep 6 00:28:15.901248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4059364187.mount: Deactivated successfully. Sep 6 00:28:16.236825 update_engine[1188]: I0906 00:28:16.236138 1188 update_attempter.cc:509] Updating boot flags... Sep 6 00:28:24.221867 env[1201]: time="2025-09-06T00:28:24.221750354Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:24.224911 env[1201]: time="2025-09-06T00:28:24.224673394Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:24.229070 env[1201]: time="2025-09-06T00:28:24.229005783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:24.232960 env[1201]: time="2025-09-06T00:28:24.232921969Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:24.234045 env[1201]: time="2025-09-06T00:28:24.233985344Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Sep 6 00:28:25.143668 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 6 00:28:25.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:25.144115 systemd[1]: Stopped kubelet.service. Sep 6 00:28:25.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:25.157174 kernel: audit: type=1130 audit(1757118505.144:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:25.157390 kernel: audit: type=1131 audit(1757118505.149:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:25.153052 systemd[1]: Starting kubelet.service... Sep 6 00:28:25.937407 systemd[1]: Started kubelet.service. Sep 6 00:28:25.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:25.946135 kernel: audit: type=1130 audit(1757118505.937:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:26.025180 kubelet[1581]: E0906 00:28:26.025068 1581 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 00:28:26.027937 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 00:28:26.028204 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 00:28:26.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:28:26.035130 kernel: audit: type=1131 audit(1757118506.028:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 00:28:31.839010 systemd[1]: Stopped kubelet.service. Sep 6 00:28:31.847164 kernel: audit: type=1130 audit(1757118511.839:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:31.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:31.857692 kernel: audit: type=1131 audit(1757118511.846:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:31.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:31.854951 systemd[1]: Starting kubelet.service... Sep 6 00:28:31.897499 systemd[1]: Reloading. Sep 6 00:28:32.072187 /usr/lib/systemd/system-generators/torcx-generator[1614]: time="2025-09-06T00:28:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:28:32.073120 /usr/lib/systemd/system-generators/torcx-generator[1614]: time="2025-09-06T00:28:32Z" level=info msg="torcx already run" Sep 6 00:28:32.198865 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:28:32.199252 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:28:32.230034 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:28:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.340312 kernel: audit: type=1400 audit(1757118512.333:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.346118 kernel: audit: type=1400 audit(1757118512.333:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.357748 kernel: audit: type=1400 audit(1757118512.345:279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.357840 kernel: audit: type=1400 audit(1757118512.345:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.363151 kernel: audit: type=1400 audit(1757118512.345:281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.368418 kernel: audit: type=1400 audit(1757118512.345:282): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.373702 kernel: audit: type=1400 audit(1757118512.345:283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.379008 kernel: audit: type=1400 audit(1757118512.345:284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.345000 audit: BPF prog-id=46 op=LOAD Sep 6 00:28:32.347000 audit: BPF prog-id=27 op=UNLOAD Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.351000 audit: BPF prog-id=47 op=LOAD Sep 6 00:28:32.351000 audit: BPF prog-id=44 op=UNLOAD Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit: BPF prog-id=48 op=LOAD Sep 6 00:28:32.356000 audit: BPF prog-id=28 op=UNLOAD Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit: BPF prog-id=49 op=LOAD Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.362000 audit: BPF prog-id=50 op=LOAD Sep 6 00:28:32.362000 audit: BPF prog-id=29 op=UNLOAD Sep 6 00:28:32.362000 audit: BPF prog-id=30 op=UNLOAD Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.377000 audit: BPF prog-id=51 op=LOAD Sep 6 00:28:32.377000 audit: BPF prog-id=31 op=UNLOAD Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit: BPF prog-id=32 op=UNLOAD Sep 6 00:28:32.378000 audit: BPF prog-id=33 op=UNLOAD Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.379000 audit: BPF prog-id=34 op=UNLOAD Sep 6 00:28:32.379000 audit: BPF prog-id=35 op=UNLOAD Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.382000 audit: BPF prog-id=56 op=LOAD Sep 6 00:28:32.383000 audit: BPF prog-id=38 op=UNLOAD Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit: BPF prog-id=57 op=LOAD Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.383000 audit: BPF prog-id=58 op=LOAD Sep 6 00:28:32.383000 audit: BPF prog-id=39 op=UNLOAD Sep 6 00:28:32.383000 audit: BPF prog-id=40 op=UNLOAD Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.385000 audit: BPF prog-id=59 op=LOAD Sep 6 00:28:32.385000 audit: BPF prog-id=36 op=UNLOAD Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:32.386000 audit: BPF prog-id=60 op=LOAD Sep 6 00:28:32.386000 audit: BPF prog-id=37 op=UNLOAD Sep 6 00:28:32.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:32.423975 systemd[1]: Started kubelet.service. Sep 6 00:28:32.431763 systemd[1]: Stopping kubelet.service... Sep 6 00:28:32.432542 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 00:28:32.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:32.432835 systemd[1]: Stopped kubelet.service. Sep 6 00:28:32.436361 systemd[1]: Starting kubelet.service... Sep 6 00:28:32.603665 systemd[1]: Started kubelet.service. Sep 6 00:28:32.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:32.783828 kubelet[1672]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:28:32.783828 kubelet[1672]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:28:32.783828 kubelet[1672]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:28:32.784684 kubelet[1672]: I0906 00:28:32.783963 1672 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:28:33.437343 kubelet[1672]: I0906 00:28:33.437271 1672 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 6 00:28:33.437343 kubelet[1672]: I0906 00:28:33.437328 1672 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:28:33.437837 kubelet[1672]: I0906 00:28:33.437800 1672 server.go:956] "Client rotation is on, will bootstrap in background" Sep 6 00:28:33.495295 kubelet[1672]: I0906 00:28:33.495240 1672 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:28:33.496289 kubelet[1672]: E0906 00:28:33.495374 1672 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.9.98:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Sep 6 00:28:33.509902 kubelet[1672]: E0906 00:28:33.509799 1672 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:28:33.509902 kubelet[1672]: I0906 00:28:33.509865 1672 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:28:33.518230 kubelet[1672]: I0906 00:28:33.518194 1672 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:28:33.518868 kubelet[1672]: I0906 00:28:33.518826 1672 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:28:33.519343 kubelet[1672]: I0906 00:28:33.518983 1672 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-vva2b.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:28:33.519696 kubelet[1672]: I0906 00:28:33.519670 1672 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:28:33.519818 kubelet[1672]: I0906 00:28:33.519795 1672 container_manager_linux.go:303] "Creating device plugin manager" Sep 6 00:28:33.521231 kubelet[1672]: I0906 00:28:33.521202 1672 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:28:33.525239 kubelet[1672]: I0906 00:28:33.525211 1672 kubelet.go:480] "Attempting to sync node with API server" Sep 6 00:28:33.525468 kubelet[1672]: I0906 00:28:33.525442 1672 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:28:33.528766 kubelet[1672]: I0906 00:28:33.528729 1672 kubelet.go:386] "Adding apiserver pod source" Sep 6 00:28:33.537418 kubelet[1672]: I0906 00:28:33.537381 1672 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:28:33.551262 kubelet[1672]: E0906 00:28:33.551163 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.9.98:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 6 00:28:33.551462 kubelet[1672]: E0906 00:28:33.551307 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.9.98:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-vva2b.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 6 00:28:33.552571 kubelet[1672]: I0906 00:28:33.552506 1672 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:28:33.553887 kubelet[1672]: I0906 00:28:33.553320 1672 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 6 00:28:33.555098 kubelet[1672]: W0906 00:28:33.555056 1672 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 00:28:33.563498 kubelet[1672]: I0906 00:28:33.563464 1672 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:28:33.563767 kubelet[1672]: I0906 00:28:33.563743 1672 server.go:1289] "Started kubelet" Sep 6 00:28:33.569732 kubelet[1672]: I0906 00:28:33.569619 1672 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:28:33.572253 kubelet[1672]: I0906 00:28:33.571533 1672 server.go:317] "Adding debug handlers to kubelet server" Sep 6 00:28:33.599763 kubelet[1672]: I0906 00:28:33.599670 1672 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:28:33.600000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:33.600000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:33.600000 audit[1672]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008e6f60 a1=c000a56750 a2=c0008e6f30 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:33.600000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:33.600000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:33.600000 audit[1672]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b582e0 a1=c000a56768 a2=c0008e6ff0 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:33.602076 kubelet[1672]: I0906 00:28:33.601269 1672 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:28:33.602076 kubelet[1672]: I0906 00:28:33.601330 1672 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:28:33.602076 kubelet[1672]: I0906 00:28:33.601479 1672 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:28:33.605123 kubelet[1672]: E0906 00:28:33.603259 1672 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.9.98:6443/api/v1/namespaces/default/events\": dial tcp 10.244.9.98:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-vva2b.gb1.brightbox.com.186289fa7d39d850 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-vva2b.gb1.brightbox.com,UID:srv-vva2b.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-vva2b.gb1.brightbox.com,},FirstTimestamp:2025-09-06 00:28:33.563686992 +0000 UTC m=+0.949740411,LastTimestamp:2025-09-06 00:28:33.563686992 +0000 UTC m=+0.949740411,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-vva2b.gb1.brightbox.com,}" Sep 6 00:28:33.606324 kubelet[1672]: I0906 00:28:33.606296 1672 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:28:33.608981 kubelet[1672]: I0906 00:28:33.608955 1672 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:28:33.613223 kubelet[1672]: E0906 00:28:33.613159 1672 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-vva2b.gb1.brightbox.com\" not found" Sep 6 00:28:33.613482 kubelet[1672]: I0906 00:28:33.613458 1672 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:28:33.614058 kubelet[1672]: I0906 00:28:33.614032 1672 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:28:33.614290 kubelet[1672]: I0906 00:28:33.614268 1672 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:28:33.615114 kubelet[1672]: E0906 00:28:33.615064 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.9.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 6 00:28:33.615493 kubelet[1672]: I0906 00:28:33.615465 1672 factory.go:223] Registration of the systemd container factory successfully Sep 6 00:28:33.614000 audit[1687]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.614000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe15f27f60 a2=0 a3=7ffe15f27f4c items=0 ppid=1672 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:28:33.616117 kubelet[1672]: I0906 00:28:33.616072 1672 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:28:33.616852 kubelet[1672]: E0906 00:28:33.616733 1672 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 00:28:33.616000 audit[1688]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.616000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff38672fe0 a2=0 a3=7fff38672fcc items=0 ppid=1672 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:28:33.618891 kubelet[1672]: E0906 00:28:33.618776 1672 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.9.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-vva2b.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.9.98:6443: connect: connection refused" interval="200ms" Sep 6 00:28:33.620203 kubelet[1672]: I0906 00:28:33.620179 1672 factory.go:223] Registration of the containerd container factory successfully Sep 6 00:28:33.629000 audit[1692]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.629000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1747f500 a2=0 a3=7ffc1747f4ec items=0 ppid=1672 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:28:33.637000 audit[1696]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.637000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc43d92080 a2=0 a3=7ffc43d9206c items=0 ppid=1672 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:28:33.646120 kubelet[1672]: I0906 00:28:33.646066 1672 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:28:33.646120 kubelet[1672]: I0906 00:28:33.646117 1672 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:28:33.646344 kubelet[1672]: I0906 00:28:33.646151 1672 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:28:33.657420 kubelet[1672]: I0906 00:28:33.657368 1672 policy_none.go:49] "None policy: Start" Sep 6 00:28:33.657557 kubelet[1672]: I0906 00:28:33.657436 1672 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:28:33.659161 kubelet[1672]: I0906 00:28:33.657474 1672 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:28:33.665000 audit[1700]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.665000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe229c4a80 a2=0 a3=7ffe229c4a6c items=0 ppid=1672 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 00:28:33.668879 systemd[1]: Created slice kubepods.slice. Sep 6 00:28:33.671249 kubelet[1672]: I0906 00:28:33.671164 1672 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 6 00:28:33.672000 audit[1703]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.672000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe5a327e0 a2=0 a3=7fffe5a327cc items=0 ppid=1672 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:28:33.675000 audit[1705]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.675000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa2b1c540 a2=0 a3=7fffa2b1c52c items=0 ppid=1672 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:28:33.677702 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 00:28:33.682918 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 00:28:33.685000 audit[1702]: NETFILTER_CFG table=mangle:33 family=10 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:33.685000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4acc61d0 a2=0 a3=7ffe4acc61bc items=0 ppid=1672 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 00:28:33.687310 kubelet[1672]: I0906 00:28:33.687269 1672 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 6 00:28:33.687486 kubelet[1672]: I0906 00:28:33.687328 1672 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 6 00:28:33.687486 kubelet[1672]: I0906 00:28:33.687429 1672 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:28:33.687486 kubelet[1672]: I0906 00:28:33.687466 1672 kubelet.go:2436] "Starting kubelet main sync loop" Sep 6 00:28:33.687000 audit[1706]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:33.687000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfa463830 a2=0 a3=7ffcfa46381c items=0 ppid=1672 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:28:33.691606 kubelet[1672]: E0906 00:28:33.691569 1672 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 00:28:33.692000 audit[1707]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:33.693788 kubelet[1672]: E0906 00:28:33.693771 1672 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 6 00:28:33.692000 audit[1672]: AVC avc: denied { mac_admin } for pid=1672 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:33.692000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:33.692000 audit[1672]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d39dd0 a1=c000d56c48 a2=c000d39da0 a3=25 items=0 ppid=1 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.692000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:33.694273 kubelet[1672]: E0906 00:28:33.693860 1672 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 6 00:28:33.694273 kubelet[1672]: I0906 00:28:33.694074 1672 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:28:33.694273 kubelet[1672]: I0906 00:28:33.694140 1672 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:28:33.692000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb3de2800 a2=0 a3=7ffdb3de27ec items=0 ppid=1672 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 00:28:33.696232 kubelet[1672]: I0906 00:28:33.695403 1672 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:28:33.696904 kubelet[1672]: E0906 00:28:33.696623 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.9.98:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Sep 6 00:28:33.699021 kubelet[1672]: E0906 00:28:33.698993 1672 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:28:33.699586 kubelet[1672]: E0906 00:28:33.699559 1672 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-vva2b.gb1.brightbox.com\" not found" Sep 6 00:28:33.701000 audit[1709]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:33.701000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd22b2fba0 a2=0 a3=7ffd22b2fb8c items=0 ppid=1672 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 00:28:33.703000 audit[1710]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:33.703000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcab034d50 a2=0 a3=7ffcab034d3c items=0 ppid=1672 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:33.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 00:28:33.796153 kubelet[1672]: I0906 00:28:33.796083 1672 kubelet_node_status.go:75] "Attempting to register node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.797560 kubelet[1672]: E0906 00:28:33.797524 1672 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.9.98:6443/api/v1/nodes\": dial tcp 10.244.9.98:6443: connect: connection refused" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.816446 kubelet[1672]: I0906 00:28:33.816406 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5c630547d8cb06c6b3e3e0c8fca6e79-k8s-certs\") pod \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" (UID: \"d5c630547d8cb06c6b3e3e0c8fca6e79\") " pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.817240 kubelet[1672]: I0906 00:28:33.817211 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-ca-certs\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.817426 kubelet[1672]: I0906 00:28:33.817396 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-flexvolume-dir\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.817605 kubelet[1672]: I0906 00:28:33.817577 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-kubeconfig\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.817782 kubelet[1672]: I0906 00:28:33.817755 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5c4f4ddf45ca6d0e4f37a50e73c031a6-kubeconfig\") pod \"kube-scheduler-srv-vva2b.gb1.brightbox.com\" (UID: \"5c4f4ddf45ca6d0e4f37a50e73c031a6\") " pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.817955 kubelet[1672]: I0906 00:28:33.817926 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5c630547d8cb06c6b3e3e0c8fca6e79-ca-certs\") pod \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" (UID: \"d5c630547d8cb06c6b3e3e0c8fca6e79\") " pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.818178 kubelet[1672]: I0906 00:28:33.818131 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5c630547d8cb06c6b3e3e0c8fca6e79-usr-share-ca-certificates\") pod \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" (UID: \"d5c630547d8cb06c6b3e3e0c8fca6e79\") " pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.818345 kubelet[1672]: I0906 00:28:33.818319 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-k8s-certs\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.818544 kubelet[1672]: I0906 00:28:33.818492 1672 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.820413 kubelet[1672]: E0906 00:28:33.820365 1672 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.9.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-vva2b.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.9.98:6443: connect: connection refused" interval="400ms" Sep 6 00:28:33.823641 systemd[1]: Created slice kubepods-burstable-podd5c630547d8cb06c6b3e3e0c8fca6e79.slice. Sep 6 00:28:33.833541 kubelet[1672]: E0906 00:28:33.833287 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.837646 systemd[1]: Created slice kubepods-burstable-podbfb2b9c6fba4e724710fe51d0a4ff374.slice. Sep 6 00:28:33.840240 kubelet[1672]: E0906 00:28:33.840197 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:33.848880 systemd[1]: Created slice kubepods-burstable-pod5c4f4ddf45ca6d0e4f37a50e73c031a6.slice. Sep 6 00:28:33.852288 kubelet[1672]: E0906 00:28:33.852223 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:34.001045 kubelet[1672]: I0906 00:28:34.001006 1672 kubelet_node_status.go:75] "Attempting to register node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:34.001772 kubelet[1672]: E0906 00:28:34.001730 1672 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.9.98:6443/api/v1/nodes\": dial tcp 10.244.9.98:6443: connect: connection refused" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:34.136190 env[1201]: time="2025-09-06T00:28:34.136046326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-vva2b.gb1.brightbox.com,Uid:d5c630547d8cb06c6b3e3e0c8fca6e79,Namespace:kube-system,Attempt:0,}" Sep 6 00:28:34.141876 env[1201]: time="2025-09-06T00:28:34.141818959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-vva2b.gb1.brightbox.com,Uid:bfb2b9c6fba4e724710fe51d0a4ff374,Namespace:kube-system,Attempt:0,}" Sep 6 00:28:34.154516 env[1201]: time="2025-09-06T00:28:34.154448081Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-vva2b.gb1.brightbox.com,Uid:5c4f4ddf45ca6d0e4f37a50e73c031a6,Namespace:kube-system,Attempt:0,}" Sep 6 00:28:34.221376 kubelet[1672]: E0906 00:28:34.221287 1672 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.9.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-vva2b.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.9.98:6443: connect: connection refused" interval="800ms" Sep 6 00:28:34.406052 kubelet[1672]: I0906 00:28:34.405417 1672 kubelet_node_status.go:75] "Attempting to register node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:34.406251 kubelet[1672]: E0906 00:28:34.406223 1672 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.9.98:6443/api/v1/nodes\": dial tcp 10.244.9.98:6443: connect: connection refused" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:34.482575 kubelet[1672]: E0906 00:28:34.482503 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.9.98:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 6 00:28:34.613216 kubelet[1672]: E0906 00:28:34.613144 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.9.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 6 00:28:34.709994 kubelet[1672]: E0906 00:28:34.709298 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.9.98:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Sep 6 00:28:34.882225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1898335068.mount: Deactivated successfully. Sep 6 00:28:34.900878 env[1201]: time="2025-09-06T00:28:34.900779904Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.906492 env[1201]: time="2025-09-06T00:28:34.906426301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.910602 env[1201]: time="2025-09-06T00:28:34.910560029Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.912701 env[1201]: time="2025-09-06T00:28:34.912665791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.915885 env[1201]: time="2025-09-06T00:28:34.915848581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.917325 env[1201]: time="2025-09-06T00:28:34.917248656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.925285 env[1201]: time="2025-09-06T00:28:34.925221921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.931648 env[1201]: time="2025-09-06T00:28:34.931581375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.939423 env[1201]: time="2025-09-06T00:28:34.939298281Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.942111 env[1201]: time="2025-09-06T00:28:34.942052866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.943364 env[1201]: time="2025-09-06T00:28:34.943316433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.966505 env[1201]: time="2025-09-06T00:28:34.966252372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:34.987565 env[1201]: time="2025-09-06T00:28:34.987436461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:28:34.987828 env[1201]: time="2025-09-06T00:28:34.987528593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:28:34.987828 env[1201]: time="2025-09-06T00:28:34.987546929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:28:34.987828 env[1201]: time="2025-09-06T00:28:34.987762842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/966acbe1491d2389664342ded965bdd744e539774b19774c97ef9a5301d7ee2a pid=1721 runtime=io.containerd.runc.v2 Sep 6 00:28:34.994465 kubelet[1672]: E0906 00:28:34.994408 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.9.98:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-vva2b.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 6 00:28:35.012986 env[1201]: time="2025-09-06T00:28:35.012856765Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:28:35.013230 env[1201]: time="2025-09-06T00:28:35.012993407Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:28:35.013230 env[1201]: time="2025-09-06T00:28:35.013043274Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:28:35.013361 env[1201]: time="2025-09-06T00:28:35.013267625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef3dfc41b45c4a5120ea8e8e533b35be6ee84d230e4f3e8e285074d00307737a pid=1738 runtime=io.containerd.runc.v2 Sep 6 00:28:35.025552 kubelet[1672]: E0906 00:28:35.024799 1672 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.9.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-vva2b.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.9.98:6443: connect: connection refused" interval="1.6s" Sep 6 00:28:35.035201 systemd[1]: Started cri-containerd-966acbe1491d2389664342ded965bdd744e539774b19774c97ef9a5301d7ee2a.scope. Sep 6 00:28:35.065509 systemd[1]: Started cri-containerd-ef3dfc41b45c4a5120ea8e8e533b35be6ee84d230e4f3e8e285074d00307737a.scope. Sep 6 00:28:35.085018 env[1201]: time="2025-09-06T00:28:35.084889942Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:28:35.085442 env[1201]: time="2025-09-06T00:28:35.085365160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:28:35.085626 env[1201]: time="2025-09-06T00:28:35.085573174Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:28:35.086004 env[1201]: time="2025-09-06T00:28:35.085953073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/49138403193109813b95269f41cbd28a3b2bc11c73623ff574b0f2213d976b01 pid=1781 runtime=io.containerd.runc.v2 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.090000 audit: BPF prog-id=61 op=LOAD Sep 6 00:28:35.092000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.092000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1721 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936366163626531343931643233383936363433343264656439363562 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1721 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936366163626531343931643233383936363433343264656439363562 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.095000 audit: BPF prog-id=62 op=LOAD Sep 6 00:28:35.095000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002994a0 items=0 ppid=1721 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936366163626531343931643233383936363433343264656439363562 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.097000 audit: BPF prog-id=63 op=LOAD Sep 6 00:28:35.097000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002994e8 items=0 ppid=1721 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936366163626531343931643233383936363433343264656439363562 Sep 6 00:28:35.099000 audit: BPF prog-id=63 op=UNLOAD Sep 6 00:28:35.103000 audit: BPF prog-id=62 op=UNLOAD Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { perfmon } for pid=1734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit[1734]: AVC avc: denied { bpf } for pid=1734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.103000 audit: BPF prog-id=64 op=LOAD Sep 6 00:28:35.103000 audit[1734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002998f8 items=0 ppid=1721 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936366163626531343931643233383936363433343264656439363562 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.120000 audit: BPF prog-id=65 op=LOAD Sep 6 00:28:35.122000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.122000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1738 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566336466633431623435633461353132306561386538653533336233 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1738 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566336466633431623435633461353132306561386538653533336233 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.123000 audit: BPF prog-id=66 op=LOAD Sep 6 00:28:35.123000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f4250 items=0 ppid=1738 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566336466633431623435633461353132306561386538653533336233 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.124000 audit: BPF prog-id=67 op=LOAD Sep 6 00:28:35.124000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f4298 items=0 ppid=1738 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566336466633431623435633461353132306561386538653533336233 Sep 6 00:28:35.126000 audit: BPF prog-id=67 op=UNLOAD Sep 6 00:28:35.126000 audit: BPF prog-id=66 op=UNLOAD Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.126000 audit: BPF prog-id=68 op=LOAD Sep 6 00:28:35.126000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f46a8 items=0 ppid=1738 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566336466633431623435633461353132306561386538653533336233 Sep 6 00:28:35.151510 systemd[1]: Started cri-containerd-49138403193109813b95269f41cbd28a3b2bc11c73623ff574b0f2213d976b01.scope. Sep 6 00:28:35.179355 env[1201]: time="2025-09-06T00:28:35.179276841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-vva2b.gb1.brightbox.com,Uid:d5c630547d8cb06c6b3e3e0c8fca6e79,Namespace:kube-system,Attempt:0,} returns sandbox id \"ef3dfc41b45c4a5120ea8e8e533b35be6ee84d230e4f3e8e285074d00307737a\"" Sep 6 00:28:35.192504 env[1201]: time="2025-09-06T00:28:35.192444929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-vva2b.gb1.brightbox.com,Uid:bfb2b9c6fba4e724710fe51d0a4ff374,Namespace:kube-system,Attempt:0,} returns sandbox id \"966acbe1491d2389664342ded965bdd744e539774b19774c97ef9a5301d7ee2a\"" Sep 6 00:28:35.194940 env[1201]: time="2025-09-06T00:28:35.194896358Z" level=info msg="CreateContainer within sandbox \"ef3dfc41b45c4a5120ea8e8e533b35be6ee84d230e4f3e8e285074d00307737a\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.209000 audit: BPF prog-id=69 op=LOAD Sep 6 00:28:35.210000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.210000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1781 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313338343033313933313039383133623935323639663431636264 Sep 6 00:28:35.211000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.211000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1781 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313338343033313933313039383133623935323639663431636264 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.212000 audit: BPF prog-id=70 op=LOAD Sep 6 00:28:35.212000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098520 items=0 ppid=1781 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313338343033313933313039383133623935323639663431636264 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.213000 audit: BPF prog-id=71 op=LOAD Sep 6 00:28:35.213000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098568 items=0 ppid=1781 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313338343033313933313039383133623935323639663431636264 Sep 6 00:28:35.214000 audit: BPF prog-id=71 op=UNLOAD Sep 6 00:28:35.214000 audit: BPF prog-id=70 op=UNLOAD Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.215000 audit: BPF prog-id=72 op=LOAD Sep 6 00:28:35.215000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098978 items=0 ppid=1781 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313338343033313933313039383133623935323639663431636264 Sep 6 00:28:35.218751 kubelet[1672]: I0906 00:28:35.218258 1672 kubelet_node_status.go:75] "Attempting to register node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:35.218751 kubelet[1672]: E0906 00:28:35.218678 1672 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.9.98:6443/api/v1/nodes\": dial tcp 10.244.9.98:6443: connect: connection refused" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:35.239695 env[1201]: time="2025-09-06T00:28:35.239633615Z" level=info msg="CreateContainer within sandbox \"966acbe1491d2389664342ded965bdd744e539774b19774c97ef9a5301d7ee2a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 6 00:28:35.262983 env[1201]: time="2025-09-06T00:28:35.262915801Z" level=info msg="CreateContainer within sandbox \"ef3dfc41b45c4a5120ea8e8e533b35be6ee84d230e4f3e8e285074d00307737a\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"92b34af9c0cbbd309cc193b1765f9606876746d7cb05b5f7d6107f7a680feb9d\"" Sep 6 00:28:35.264308 env[1201]: time="2025-09-06T00:28:35.264213507Z" level=info msg="StartContainer for \"92b34af9c0cbbd309cc193b1765f9606876746d7cb05b5f7d6107f7a680feb9d\"" Sep 6 00:28:35.270796 env[1201]: time="2025-09-06T00:28:35.270748772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-vva2b.gb1.brightbox.com,Uid:5c4f4ddf45ca6d0e4f37a50e73c031a6,Namespace:kube-system,Attempt:0,} returns sandbox id \"49138403193109813b95269f41cbd28a3b2bc11c73623ff574b0f2213d976b01\"" Sep 6 00:28:35.277275 env[1201]: time="2025-09-06T00:28:35.277217076Z" level=info msg="CreateContainer within sandbox \"49138403193109813b95269f41cbd28a3b2bc11c73623ff574b0f2213d976b01\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 6 00:28:35.282174 env[1201]: time="2025-09-06T00:28:35.282128087Z" level=info msg="CreateContainer within sandbox \"966acbe1491d2389664342ded965bdd744e539774b19774c97ef9a5301d7ee2a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"13d4732643e5c19b0e9641ac37cc2aa1583ba0db67b40a6d9dbd503746200477\"" Sep 6 00:28:35.283668 env[1201]: time="2025-09-06T00:28:35.283600844Z" level=info msg="StartContainer for \"13d4732643e5c19b0e9641ac37cc2aa1583ba0db67b40a6d9dbd503746200477\"" Sep 6 00:28:35.307346 systemd[1]: Started cri-containerd-92b34af9c0cbbd309cc193b1765f9606876746d7cb05b5f7d6107f7a680feb9d.scope. Sep 6 00:28:35.327323 systemd[1]: Started cri-containerd-13d4732643e5c19b0e9641ac37cc2aa1583ba0db67b40a6d9dbd503746200477.scope. Sep 6 00:28:35.330244 env[1201]: time="2025-09-06T00:28:35.330182964Z" level=info msg="CreateContainer within sandbox \"49138403193109813b95269f41cbd28a3b2bc11c73623ff574b0f2213d976b01\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e361093a2eaa9e488ee78245d24b4385284cde8b417069f743d6138ad314d778\"" Sep 6 00:28:35.331592 env[1201]: time="2025-09-06T00:28:35.331294728Z" level=info msg="StartContainer for \"e361093a2eaa9e488ee78245d24b4385284cde8b417069f743d6138ad314d778\"" Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.358000 audit: BPF prog-id=73 op=LOAD Sep 6 00:28:35.359000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.359000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1738 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932623334616639633063626264333039636331393362313736356639 Sep 6 00:28:35.359000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.359000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1738 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932623334616639633063626264333039636331393362313736356639 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.360000 audit: BPF prog-id=74 op=LOAD Sep 6 00:28:35.360000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000301330 items=0 ppid=1738 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932623334616639633063626264333039636331393362313736356639 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.361000 audit: BPF prog-id=75 op=LOAD Sep 6 00:28:35.361000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000301378 items=0 ppid=1738 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932623334616639633063626264333039636331393362313736356639 Sep 6 00:28:35.365000 audit: BPF prog-id=75 op=UNLOAD Sep 6 00:28:35.365000 audit: BPF prog-id=74 op=UNLOAD Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.367000 audit: BPF prog-id=76 op=LOAD Sep 6 00:28:35.367000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000301788 items=0 ppid=1738 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932623334616639633063626264333039636331393362313736356639 Sep 6 00:28:35.385882 systemd[1]: Started cri-containerd-e361093a2eaa9e488ee78245d24b4385284cde8b417069f743d6138ad314d778.scope. Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit: BPF prog-id=77 op=LOAD Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1721 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643437333236343365356331396230653936343161633337636332 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1721 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643437333236343365356331396230653936343161633337636332 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit: BPF prog-id=78 op=LOAD Sep 6 00:28:35.400000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c4c40 items=0 ppid=1721 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643437333236343365356331396230653936343161633337636332 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.400000 audit: BPF prog-id=79 op=LOAD Sep 6 00:28:35.400000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c4c88 items=0 ppid=1721 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643437333236343365356331396230653936343161633337636332 Sep 6 00:28:35.401000 audit: BPF prog-id=79 op=UNLOAD Sep 6 00:28:35.401000 audit: BPF prog-id=78 op=UNLOAD Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { perfmon } for pid=1864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit[1864]: AVC avc: denied { bpf } for pid=1864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.401000 audit: BPF prog-id=80 op=LOAD Sep 6 00:28:35.401000 audit[1864]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c5098 items=0 ppid=1721 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643437333236343365356331396230653936343161633337636332 Sep 6 00:28:35.442441 env[1201]: time="2025-09-06T00:28:35.442308304Z" level=info msg="StartContainer for \"92b34af9c0cbbd309cc193b1765f9606876746d7cb05b5f7d6107f7a680feb9d\" returns successfully" Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.462000 audit: BPF prog-id=81 op=LOAD Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1781 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363130393361326561613965343838656537383234356432346234 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1781 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363130393361326561613965343838656537383234356432346234 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit: BPF prog-id=82 op=LOAD Sep 6 00:28:35.463000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000322370 items=0 ppid=1781 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363130393361326561613965343838656537383234356432346234 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit: BPF prog-id=83 op=LOAD Sep 6 00:28:35.463000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003223b8 items=0 ppid=1781 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363130393361326561613965343838656537383234356432346234 Sep 6 00:28:35.463000 audit: BPF prog-id=83 op=UNLOAD Sep 6 00:28:35.463000 audit: BPF prog-id=82 op=UNLOAD Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:35.463000 audit: BPF prog-id=84 op=LOAD Sep 6 00:28:35.463000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003227c8 items=0 ppid=1781 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:35.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363130393361326561613965343838656537383234356432346234 Sep 6 00:28:35.518803 env[1201]: time="2025-09-06T00:28:35.518159871Z" level=info msg="StartContainer for \"13d4732643e5c19b0e9641ac37cc2aa1583ba0db67b40a6d9dbd503746200477\" returns successfully" Sep 6 00:28:35.540921 env[1201]: time="2025-09-06T00:28:35.540844299Z" level=info msg="StartContainer for \"e361093a2eaa9e488ee78245d24b4385284cde8b417069f743d6138ad314d778\" returns successfully" Sep 6 00:28:35.653351 kubelet[1672]: E0906 00:28:35.653260 1672 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.9.98:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Sep 6 00:28:35.709371 kubelet[1672]: E0906 00:28:35.709300 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:35.711604 kubelet[1672]: E0906 00:28:35.711577 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:35.717378 kubelet[1672]: E0906 00:28:35.717253 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:36.106372 kubelet[1672]: E0906 00:28:36.106204 1672 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.9.98:6443/api/v1/namespaces/default/events\": dial tcp 10.244.9.98:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-vva2b.gb1.brightbox.com.186289fa7d39d850 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-vva2b.gb1.brightbox.com,UID:srv-vva2b.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-vva2b.gb1.brightbox.com,},FirstTimestamp:2025-09-06 00:28:33.563686992 +0000 UTC m=+0.949740411,LastTimestamp:2025-09-06 00:28:33.563686992 +0000 UTC m=+0.949740411,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-vva2b.gb1.brightbox.com,}" Sep 6 00:28:36.432024 kubelet[1672]: E0906 00:28:36.431697 1672 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.9.98:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.9.98:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 6 00:28:36.626629 kubelet[1672]: E0906 00:28:36.626568 1672 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.9.98:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-vva2b.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.9.98:6443: connect: connection refused" interval="3.2s" Sep 6 00:28:36.720125 kubelet[1672]: E0906 00:28:36.720072 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:36.721643 kubelet[1672]: E0906 00:28:36.721584 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:36.821576 kubelet[1672]: I0906 00:28:36.821538 1672 kubelet_node_status.go:75] "Attempting to register node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:39.778330 kernel: kauditd_printk_skb: 615 callbacks suppressed Sep 6 00:28:39.778714 kernel: audit: type=1400 audit(1757118519.769:546): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.769000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.769000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.795802 kernel: audit: type=1400 audit(1757118519.769:547): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.795925 kernel: audit: type=1300 audit(1757118519.769:546): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0080c1050 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.769000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0080c1050 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.808106 kernel: audit: type=1327 audit(1757118519.769:546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.771000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.824125 kernel: audit: type=1400 audit(1757118519.771:548): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.771000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0080c10b0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.847109 kernel: audit: type=1300 audit(1757118519.771:548): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0080c10b0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.866023 kernel: audit: type=1327 audit(1757118519.771:548): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.866176 kernel: audit: type=1300 audit(1757118519.769:547): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007027a10 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.769000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007027a10 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.874117 kernel: audit: type=1327 audit(1757118519.769:547): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.799000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.799000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c006feb2a0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.799000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.882145 kernel: audit: type=1400 audit(1757118519.799:549): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.883000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.883000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c0051e9ce0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.884000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.884000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c0080c17a0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:28:39.884000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:28:39.885000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.885000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0002d1020 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:39.885000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:39.886000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:39.886000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000875e00 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:39.886000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:40.036989 kubelet[1672]: E0906 00:28:40.036806 1672 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.179366 kubelet[1672]: E0906 00:28:40.179322 1672 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-vva2b.gb1.brightbox.com\" not found" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.238460 kubelet[1672]: I0906 00:28:40.238385 1672 kubelet_node_status.go:78] "Successfully registered node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.238860 kubelet[1672]: E0906 00:28:40.238814 1672 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"srv-vva2b.gb1.brightbox.com\": node \"srv-vva2b.gb1.brightbox.com\" not found" Sep 6 00:28:40.318425 kubelet[1672]: I0906 00:28:40.318257 1672 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.352827 kubelet[1672]: E0906 00:28:40.352761 1672 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-vva2b.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.352827 kubelet[1672]: I0906 00:28:40.352815 1672 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.360416 kubelet[1672]: E0906 00:28:40.360358 1672 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.360416 kubelet[1672]: I0906 00:28:40.360407 1672 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.363726 kubelet[1672]: E0906 00:28:40.363692 1672 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:40.541985 kubelet[1672]: I0906 00:28:40.541883 1672 apiserver.go:52] "Watching apiserver" Sep 6 00:28:40.615965 kubelet[1672]: I0906 00:28:40.614353 1672 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:28:42.224372 systemd[1]: Reloading. Sep 6 00:28:42.379783 /usr/lib/systemd/system-generators/torcx-generator[1977]: time="2025-09-06T00:28:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 00:28:42.381656 /usr/lib/systemd/system-generators/torcx-generator[1977]: time="2025-09-06T00:28:42Z" level=info msg="torcx already run" Sep 6 00:28:42.510701 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 00:28:42.510747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 00:28:42.539834 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.668000 audit: BPF prog-id=85 op=LOAD Sep 6 00:28:42.668000 audit: BPF prog-id=46 op=UNLOAD Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.670000 audit: BPF prog-id=86 op=LOAD Sep 6 00:28:42.670000 audit: BPF prog-id=47 op=UNLOAD Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.674000 audit: BPF prog-id=87 op=LOAD Sep 6 00:28:42.674000 audit: BPF prog-id=61 op=UNLOAD Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.675000 audit: BPF prog-id=88 op=LOAD Sep 6 00:28:42.675000 audit: BPF prog-id=48 op=UNLOAD Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit: BPF prog-id=89 op=LOAD Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.676000 audit: BPF prog-id=90 op=LOAD Sep 6 00:28:42.676000 audit: BPF prog-id=49 op=UNLOAD Sep 6 00:28:42.676000 audit: BPF prog-id=50 op=UNLOAD Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.678000 audit: BPF prog-id=91 op=LOAD Sep 6 00:28:42.678000 audit: BPF prog-id=65 op=UNLOAD Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit: BPF prog-id=92 op=LOAD Sep 6 00:28:42.680000 audit: BPF prog-id=51 op=UNLOAD Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit: BPF prog-id=93 op=LOAD Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit: BPF prog-id=94 op=LOAD Sep 6 00:28:42.681000 audit: BPF prog-id=52 op=UNLOAD Sep 6 00:28:42.681000 audit: BPF prog-id=53 op=UNLOAD Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit: BPF prog-id=95 op=LOAD Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.681000 audit: BPF prog-id=96 op=LOAD Sep 6 00:28:42.681000 audit: BPF prog-id=54 op=UNLOAD Sep 6 00:28:42.682000 audit: BPF prog-id=55 op=UNLOAD Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.683000 audit: BPF prog-id=97 op=LOAD Sep 6 00:28:42.683000 audit: BPF prog-id=77 op=UNLOAD Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.684000 audit: BPF prog-id=98 op=LOAD Sep 6 00:28:42.684000 audit: BPF prog-id=69 op=UNLOAD Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.687000 audit: BPF prog-id=99 op=LOAD Sep 6 00:28:42.687000 audit: BPF prog-id=73 op=UNLOAD Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.688000 audit: BPF prog-id=100 op=LOAD Sep 6 00:28:42.688000 audit: BPF prog-id=81 op=UNLOAD Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit: BPF prog-id=101 op=LOAD Sep 6 00:28:42.690000 audit: BPF prog-id=56 op=UNLOAD Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit: BPF prog-id=102 op=LOAD Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.690000 audit: BPF prog-id=103 op=LOAD Sep 6 00:28:42.690000 audit: BPF prog-id=57 op=UNLOAD Sep 6 00:28:42.690000 audit: BPF prog-id=58 op=UNLOAD Sep 6 00:28:42.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.692000 audit: BPF prog-id=104 op=LOAD Sep 6 00:28:42.692000 audit: BPF prog-id=59 op=UNLOAD Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:42.694000 audit: BPF prog-id=105 op=LOAD Sep 6 00:28:42.694000 audit: BPF prog-id=60 op=UNLOAD Sep 6 00:28:42.730556 systemd[1]: Stopping kubelet.service... Sep 6 00:28:42.755684 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 00:28:42.756080 systemd[1]: Stopped kubelet.service. Sep 6 00:28:42.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:42.756270 systemd[1]: kubelet.service: Consumed 1.413s CPU time. Sep 6 00:28:42.759514 systemd[1]: Starting kubelet.service... Sep 6 00:28:44.480440 systemd[1]: Started kubelet.service. Sep 6 00:28:44.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:28:44.586000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 6 00:28:44.586000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000edbc0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:44.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:44.620778 kubelet[2027]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:28:44.621596 kubelet[2027]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 00:28:44.621721 kubelet[2027]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 00:28:44.622038 kubelet[2027]: I0906 00:28:44.621984 2027 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 00:28:44.647082 kubelet[2027]: I0906 00:28:44.647011 2027 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 6 00:28:44.647082 kubelet[2027]: I0906 00:28:44.647060 2027 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 00:28:44.647825 kubelet[2027]: I0906 00:28:44.647531 2027 server.go:956] "Client rotation is on, will bootstrap in background" Sep 6 00:28:44.649828 kubelet[2027]: I0906 00:28:44.649790 2027 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Sep 6 00:28:44.679356 kubelet[2027]: I0906 00:28:44.678531 2027 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 00:28:44.694649 kubelet[2027]: E0906 00:28:44.694588 2027 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 00:28:44.695026 kubelet[2027]: I0906 00:28:44.694995 2027 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 00:28:44.709829 kubelet[2027]: I0906 00:28:44.709780 2027 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 00:28:44.710563 kubelet[2027]: I0906 00:28:44.710502 2027 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 00:28:44.711011 kubelet[2027]: I0906 00:28:44.710693 2027 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-vva2b.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 00:28:44.711514 kubelet[2027]: I0906 00:28:44.711487 2027 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 00:28:44.711649 kubelet[2027]: I0906 00:28:44.711626 2027 container_manager_linux.go:303] "Creating device plugin manager" Sep 6 00:28:44.711876 kubelet[2027]: I0906 00:28:44.711852 2027 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:28:44.712411 kubelet[2027]: I0906 00:28:44.712388 2027 kubelet.go:480] "Attempting to sync node with API server" Sep 6 00:28:44.712559 kubelet[2027]: I0906 00:28:44.712534 2027 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 00:28:44.712723 kubelet[2027]: I0906 00:28:44.712699 2027 kubelet.go:386] "Adding apiserver pod source" Sep 6 00:28:44.712867 kubelet[2027]: I0906 00:28:44.712843 2027 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 00:28:44.725566 kubelet[2027]: I0906 00:28:44.725520 2027 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 00:28:44.726869 kubelet[2027]: I0906 00:28:44.726839 2027 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 6 00:28:44.735590 kubelet[2027]: I0906 00:28:44.733513 2027 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 00:28:44.735874 kubelet[2027]: I0906 00:28:44.735848 2027 server.go:1289] "Started kubelet" Sep 6 00:28:44.739000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:44.739000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:44.739000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000874720 a1=c000935398 a2=c0008746f0 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:44.739000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:44.741784 kubelet[2027]: I0906 00:28:44.741726 2027 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 00:28:44.740000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:44.740000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:44.740000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000113ec0 a1=c0009353b0 a2=c0008747b0 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:44.740000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:44.742427 kubelet[2027]: I0906 00:28:44.742396 2027 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 00:28:44.742604 kubelet[2027]: I0906 00:28:44.742580 2027 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 00:28:44.751163 kubelet[2027]: I0906 00:28:44.751032 2027 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 00:28:44.752824 kubelet[2027]: I0906 00:28:44.752797 2027 server.go:317] "Adding debug handlers to kubelet server" Sep 6 00:28:44.759687 kubelet[2027]: I0906 00:28:44.759604 2027 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 00:28:44.760240 kubelet[2027]: I0906 00:28:44.760211 2027 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 00:28:44.762246 kubelet[2027]: I0906 00:28:44.762217 2027 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 00:28:44.766620 kubelet[2027]: I0906 00:28:44.766588 2027 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 00:28:44.767258 kubelet[2027]: E0906 00:28:44.767227 2027 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-vva2b.gb1.brightbox.com\" not found" Sep 6 00:28:44.769458 kubelet[2027]: I0906 00:28:44.769430 2027 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 00:28:44.769849 kubelet[2027]: I0906 00:28:44.769825 2027 reconciler.go:26] "Reconciler: start to sync state" Sep 6 00:28:44.774079 kubelet[2027]: I0906 00:28:44.774040 2027 factory.go:223] Registration of the systemd container factory successfully Sep 6 00:28:44.774755 kubelet[2027]: I0906 00:28:44.774722 2027 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 00:28:44.785171 kubelet[2027]: I0906 00:28:44.785131 2027 factory.go:223] Registration of the containerd container factory successfully Sep 6 00:28:44.811000 kubelet[2027]: I0906 00:28:44.810935 2027 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 6 00:28:44.814122 kubelet[2027]: I0906 00:28:44.814079 2027 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 6 00:28:44.814292 kubelet[2027]: I0906 00:28:44.814266 2027 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 6 00:28:44.814459 kubelet[2027]: I0906 00:28:44.814432 2027 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 00:28:44.814592 kubelet[2027]: I0906 00:28:44.814568 2027 kubelet.go:2436] "Starting kubelet main sync loop" Sep 6 00:28:44.814809 kubelet[2027]: E0906 00:28:44.814777 2027 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901330 2027 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901358 2027 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901390 2027 state_mem.go:36] "Initialized new in-memory state store" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901656 2027 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901693 2027 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901736 2027 policy_none.go:49] "None policy: Start" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901778 2027 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901810 2027 state_mem.go:35] "Initializing new in-memory state store" Sep 6 00:28:44.902334 kubelet[2027]: I0906 00:28:44.901964 2027 state_mem.go:75] "Updated machine memory state" Sep 6 00:28:44.910000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:44.914784 kubelet[2027]: E0906 00:28:44.911702 2027 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 6 00:28:44.916312 kernel: kauditd_printk_skb: 271 callbacks suppressed Sep 6 00:28:44.916467 kernel: audit: type=1400 audit(1757118524.910:803): avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:44.922911 kubelet[2027]: E0906 00:28:44.921943 2027 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 6 00:28:44.922911 kubelet[2027]: I0906 00:28:44.922673 2027 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 00:28:44.922911 kubelet[2027]: I0906 00:28:44.922721 2027 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 00:28:44.910000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:44.928184 kernel: audit: type=1401 audit(1757118524.910:803): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 00:28:44.929377 kubelet[2027]: I0906 00:28:44.928409 2027 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:44.910000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007eae70 a1=c000cfba58 a2=c0007eae40 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:44.934554 kubelet[2027]: I0906 00:28:44.933066 2027 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:44.934554 kubelet[2027]: I0906 00:28:44.933481 2027 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:44.938421 kubelet[2027]: I0906 00:28:44.937597 2027 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 00:28:44.948536 kubelet[2027]: E0906 00:28:44.948481 2027 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 00:28:44.949117 kernel: audit: type=1300 audit(1757118524.910:803): arch=c000003e syscall=188 success=no exit=-22 a0=c0007eae70 a1=c000cfba58 a2=c0007eae40 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:44.910000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:44.960268 kernel: audit: type=1327 audit(1757118524.910:803): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 00:28:44.981646 kubelet[2027]: I0906 00:28:44.981574 2027 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 6 00:28:44.982023 kubelet[2027]: I0906 00:28:44.981997 2027 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 6 00:28:44.982886 kubelet[2027]: I0906 00:28:44.982855 2027 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 6 00:28:45.090161 kubelet[2027]: I0906 00:28:45.086867 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-ca-certs\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092232 kubelet[2027]: I0906 00:28:45.092148 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-kubeconfig\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092342 kubelet[2027]: I0906 00:28:45.092259 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5c4f4ddf45ca6d0e4f37a50e73c031a6-kubeconfig\") pod \"kube-scheduler-srv-vva2b.gb1.brightbox.com\" (UID: \"5c4f4ddf45ca6d0e4f37a50e73c031a6\") " pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092422 kubelet[2027]: I0906 00:28:45.092343 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5c630547d8cb06c6b3e3e0c8fca6e79-ca-certs\") pod \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" (UID: \"d5c630547d8cb06c6b3e3e0c8fca6e79\") " pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092585 kubelet[2027]: I0906 00:28:45.092419 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5c630547d8cb06c6b3e3e0c8fca6e79-k8s-certs\") pod \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" (UID: \"d5c630547d8cb06c6b3e3e0c8fca6e79\") " pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092670 kubelet[2027]: I0906 00:28:45.092588 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5c630547d8cb06c6b3e3e0c8fca6e79-usr-share-ca-certificates\") pod \"kube-apiserver-srv-vva2b.gb1.brightbox.com\" (UID: \"d5c630547d8cb06c6b3e3e0c8fca6e79\") " pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092670 kubelet[2027]: I0906 00:28:45.092637 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-flexvolume-dir\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092787 kubelet[2027]: I0906 00:28:45.092683 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-k8s-certs\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.092787 kubelet[2027]: I0906 00:28:45.092733 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bfb2b9c6fba4e724710fe51d0a4ff374-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-vva2b.gb1.brightbox.com\" (UID: \"bfb2b9c6fba4e724710fe51d0a4ff374\") " pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.093207 kubelet[2027]: I0906 00:28:45.093166 2027 kubelet_node_status.go:75] "Attempting to register node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.107929 kubelet[2027]: I0906 00:28:45.107675 2027 kubelet_node_status.go:124] "Node was previously registered" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.107929 kubelet[2027]: I0906 00:28:45.107880 2027 kubelet_node_status.go:78] "Successfully registered node" node="srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.731679 kubelet[2027]: I0906 00:28:45.731627 2027 apiserver.go:52] "Watching apiserver" Sep 6 00:28:45.770397 kubelet[2027]: I0906 00:28:45.770323 2027 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 00:28:45.865594 kubelet[2027]: I0906 00:28:45.864738 2027 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.884335 kubelet[2027]: I0906 00:28:45.884284 2027 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Sep 6 00:28:45.884594 kubelet[2027]: E0906 00:28:45.884373 2027 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-vva2b.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" Sep 6 00:28:45.914359 kubelet[2027]: I0906 00:28:45.914210 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-vva2b.gb1.brightbox.com" podStartSLOduration=1.91413839 podStartE2EDuration="1.91413839s" podCreationTimestamp="2025-09-06 00:28:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 00:28:45.898424608 +0000 UTC m=+1.398371361" watchObservedRunningTime="2025-09-06 00:28:45.91413839 +0000 UTC m=+1.414085134" Sep 6 00:28:45.914832 kubelet[2027]: I0906 00:28:45.914782 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-vva2b.gb1.brightbox.com" podStartSLOduration=1.914774209 podStartE2EDuration="1.914774209s" podCreationTimestamp="2025-09-06 00:28:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 00:28:45.912808884 +0000 UTC m=+1.412755645" watchObservedRunningTime="2025-09-06 00:28:45.914774209 +0000 UTC m=+1.414720954" Sep 6 00:28:45.946372 kubelet[2027]: I0906 00:28:45.946296 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-vva2b.gb1.brightbox.com" podStartSLOduration=1.9462701629999999 podStartE2EDuration="1.946270163s" podCreationTimestamp="2025-09-06 00:28:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 00:28:45.924641554 +0000 UTC m=+1.424588309" watchObservedRunningTime="2025-09-06 00:28:45.946270163 +0000 UTC m=+1.446216906" Sep 6 00:28:47.378000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:47.386125 kernel: audit: type=1400 audit(1757118527.378:804): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:47.378000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011a6380 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:47.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:47.402003 kernel: audit: type=1300 audit(1757118527.378:804): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011a6380 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:47.402194 kernel: audit: type=1327 audit(1757118527.378:804): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:47.402297 kernel: audit: type=1400 audit(1757118527.378:805): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:47.378000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:47.378000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001266b00 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:47.417173 kernel: audit: type=1300 audit(1757118527.378:805): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001266b00 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:47.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:47.424423 kernel: audit: type=1327 audit(1757118527.378:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:47.378000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:47.378000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001266b40 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:47.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:47.378000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:28:47.378000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001266b80 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:28:47.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:28:48.058856 kubelet[2027]: I0906 00:28:48.058803 2027 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 6 00:28:48.059514 env[1201]: time="2025-09-06T00:28:48.059434007Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 00:28:48.059951 kubelet[2027]: I0906 00:28:48.059791 2027 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 6 00:28:48.319844 systemd[1]: Created slice kubepods-besteffort-podff37cdd8_94e0_49ac_a585_f42707df4f2b.slice. Sep 6 00:28:48.424704 kubelet[2027]: I0906 00:28:48.424625 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ff37cdd8-94e0-49ac-a585-f42707df4f2b-kube-proxy\") pod \"kube-proxy-n4xzw\" (UID: \"ff37cdd8-94e0-49ac-a585-f42707df4f2b\") " pod="kube-system/kube-proxy-n4xzw" Sep 6 00:28:48.424967 kubelet[2027]: I0906 00:28:48.424720 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ff37cdd8-94e0-49ac-a585-f42707df4f2b-xtables-lock\") pod \"kube-proxy-n4xzw\" (UID: \"ff37cdd8-94e0-49ac-a585-f42707df4f2b\") " pod="kube-system/kube-proxy-n4xzw" Sep 6 00:28:48.424967 kubelet[2027]: I0906 00:28:48.424765 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8j56g\" (UniqueName: \"kubernetes.io/projected/ff37cdd8-94e0-49ac-a585-f42707df4f2b-kube-api-access-8j56g\") pod \"kube-proxy-n4xzw\" (UID: \"ff37cdd8-94e0-49ac-a585-f42707df4f2b\") " pod="kube-system/kube-proxy-n4xzw" Sep 6 00:28:48.424967 kubelet[2027]: I0906 00:28:48.424817 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ff37cdd8-94e0-49ac-a585-f42707df4f2b-lib-modules\") pod \"kube-proxy-n4xzw\" (UID: \"ff37cdd8-94e0-49ac-a585-f42707df4f2b\") " pod="kube-system/kube-proxy-n4xzw" Sep 6 00:28:48.537495 kubelet[2027]: E0906 00:28:48.537424 2027 projected.go:289] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Sep 6 00:28:48.537831 kubelet[2027]: E0906 00:28:48.537793 2027 projected.go:194] Error preparing data for projected volume kube-api-access-8j56g for pod kube-system/kube-proxy-n4xzw: configmap "kube-root-ca.crt" not found Sep 6 00:28:48.538117 kubelet[2027]: E0906 00:28:48.538069 2027 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ff37cdd8-94e0-49ac-a585-f42707df4f2b-kube-api-access-8j56g podName:ff37cdd8-94e0-49ac-a585-f42707df4f2b nodeName:}" failed. No retries permitted until 2025-09-06 00:28:49.03802567 +0000 UTC m=+4.537972412 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-8j56g" (UniqueName: "kubernetes.io/projected/ff37cdd8-94e0-49ac-a585-f42707df4f2b-kube-api-access-8j56g") pod "kube-proxy-n4xzw" (UID: "ff37cdd8-94e0-49ac-a585-f42707df4f2b") : configmap "kube-root-ca.crt" not found Sep 6 00:28:49.133342 kubelet[2027]: I0906 00:28:49.132014 2027 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 00:28:49.232124 env[1201]: time="2025-09-06T00:28:49.232027748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n4xzw,Uid:ff37cdd8-94e0-49ac-a585-f42707df4f2b,Namespace:kube-system,Attempt:0,}" Sep 6 00:28:49.291847 env[1201]: time="2025-09-06T00:28:49.291682152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:28:49.292281 env[1201]: time="2025-09-06T00:28:49.292231277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:28:49.292490 env[1201]: time="2025-09-06T00:28:49.292436683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:28:49.294541 env[1201]: time="2025-09-06T00:28:49.294475318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/231f88de88952c16ba529f00740eae675302df87d6bfd498a48103f2ba9adb79 pid=2084 runtime=io.containerd.runc.v2 Sep 6 00:28:49.343929 systemd[1]: Started cri-containerd-231f88de88952c16ba529f00740eae675302df87d6bfd498a48103f2ba9adb79.scope. Sep 6 00:28:49.387844 systemd[1]: Created slice kubepods-besteffort-poddbb130af_0286_48a2_bc03_4452c697ee55.slice. Sep 6 00:28:49.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.431000 audit: BPF prog-id=106 op=LOAD Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2084 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233316638386465383839353263313662613532396630303734306561 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2084 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233316638386465383839353263313662613532396630303734306561 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit: BPF prog-id=107 op=LOAD Sep 6 00:28:49.433000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d610 items=0 ppid=2084 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233316638386465383839353263313662613532396630303734306561 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit: BPF prog-id=108 op=LOAD Sep 6 00:28:49.433000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d658 items=0 ppid=2084 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233316638386465383839353263313662613532396630303734306561 Sep 6 00:28:49.433000 audit: BPF prog-id=108 op=UNLOAD Sep 6 00:28:49.433000 audit: BPF prog-id=107 op=UNLOAD Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.433000 audit: BPF prog-id=109 op=LOAD Sep 6 00:28:49.433000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015da68 items=0 ppid=2084 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233316638386465383839353263313662613532396630303734306561 Sep 6 00:28:49.439034 kubelet[2027]: I0906 00:28:49.438897 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dbb130af-0286-48a2-bc03-4452c697ee55-var-lib-calico\") pod \"tigera-operator-755d956888-k45p8\" (UID: \"dbb130af-0286-48a2-bc03-4452c697ee55\") " pod="tigera-operator/tigera-operator-755d956888-k45p8" Sep 6 00:28:49.439260 kubelet[2027]: I0906 00:28:49.439218 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-82crx\" (UniqueName: \"kubernetes.io/projected/dbb130af-0286-48a2-bc03-4452c697ee55-kube-api-access-82crx\") pod \"tigera-operator-755d956888-k45p8\" (UID: \"dbb130af-0286-48a2-bc03-4452c697ee55\") " pod="tigera-operator/tigera-operator-755d956888-k45p8" Sep 6 00:28:49.461645 env[1201]: time="2025-09-06T00:28:49.461570931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n4xzw,Uid:ff37cdd8-94e0-49ac-a585-f42707df4f2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"231f88de88952c16ba529f00740eae675302df87d6bfd498a48103f2ba9adb79\"" Sep 6 00:28:49.470895 env[1201]: time="2025-09-06T00:28:49.470833191Z" level=info msg="CreateContainer within sandbox \"231f88de88952c16ba529f00740eae675302df87d6bfd498a48103f2ba9adb79\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 00:28:49.506610 env[1201]: time="2025-09-06T00:28:49.506513424Z" level=info msg="CreateContainer within sandbox \"231f88de88952c16ba529f00740eae675302df87d6bfd498a48103f2ba9adb79\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"163e98437b5ecb156ba61696aba8e1771be4be122658787ae172078df67732f8\"" Sep 6 00:28:49.507977 env[1201]: time="2025-09-06T00:28:49.507938525Z" level=info msg="StartContainer for \"163e98437b5ecb156ba61696aba8e1771be4be122658787ae172078df67732f8\"" Sep 6 00:28:49.559929 systemd[1]: Started cri-containerd-163e98437b5ecb156ba61696aba8e1771be4be122658787ae172078df67732f8.scope. Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f91c4191018 items=0 ppid=2084 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336539383433376235656362313536626136313639366162613865 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.587000 audit: BPF prog-id=110 op=LOAD Sep 6 00:28:49.587000 audit[2123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00037ff68 items=0 ppid=2084 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336539383433376235656362313536626136313639366162613865 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.589000 audit: BPF prog-id=111 op=LOAD Sep 6 00:28:49.589000 audit[2123]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00037ffb8 items=0 ppid=2084 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336539383433376235656362313536626136313639366162613865 Sep 6 00:28:49.590000 audit: BPF prog-id=111 op=UNLOAD Sep 6 00:28:49.590000 audit: BPF prog-id=110 op=UNLOAD Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { perfmon } for pid=2123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit[2123]: AVC avc: denied { bpf } for pid=2123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.591000 audit: BPF prog-id=112 op=LOAD Sep 6 00:28:49.591000 audit[2123]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003e4048 items=0 ppid=2084 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336539383433376235656362313536626136313639366162613865 Sep 6 00:28:49.618602 env[1201]: time="2025-09-06T00:28:49.618292700Z" level=info msg="StartContainer for \"163e98437b5ecb156ba61696aba8e1771be4be122658787ae172078df67732f8\" returns successfully" Sep 6 00:28:49.697057 env[1201]: time="2025-09-06T00:28:49.694354343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-k45p8,Uid:dbb130af-0286-48a2-bc03-4452c697ee55,Namespace:tigera-operator,Attempt:0,}" Sep 6 00:28:49.732814 env[1201]: time="2025-09-06T00:28:49.732670236Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:28:49.733140 env[1201]: time="2025-09-06T00:28:49.732781368Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:28:49.733140 env[1201]: time="2025-09-06T00:28:49.732803373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:28:49.733140 env[1201]: time="2025-09-06T00:28:49.733026527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/861a166e0fdf8c8441e4122ea4f7d3afc21a23b4872830364a61667f568cd092 pid=2159 runtime=io.containerd.runc.v2 Sep 6 00:28:49.757166 systemd[1]: Started cri-containerd-861a166e0fdf8c8441e4122ea4f7d3afc21a23b4872830364a61667f568cd092.scope. Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.794000 audit: BPF prog-id=113 op=LOAD Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2159 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316131363665306664663863383434316534313232656134663764 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2159 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316131363665306664663863383434316534313232656134663764 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit: BPF prog-id=114 op=LOAD Sep 6 00:28:49.795000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cdce0 items=0 ppid=2159 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316131363665306664663863383434316534313232656134663764 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit: BPF prog-id=115 op=LOAD Sep 6 00:28:49.795000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cdd28 items=0 ppid=2159 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316131363665306664663863383434316534313232656134663764 Sep 6 00:28:49.795000 audit: BPF prog-id=115 op=UNLOAD Sep 6 00:28:49.795000 audit: BPF prog-id=114 op=UNLOAD Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:49.795000 audit: BPF prog-id=116 op=LOAD Sep 6 00:28:49.795000 audit[2169]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d0138 items=0 ppid=2159 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:49.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316131363665306664663863383434316534313232656134663764 Sep 6 00:28:49.848215 env[1201]: time="2025-09-06T00:28:49.848151480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-k45p8,Uid:dbb130af-0286-48a2-bc03-4452c697ee55,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"861a166e0fdf8c8441e4122ea4f7d3afc21a23b4872830364a61667f568cd092\"" Sep 6 00:28:49.854506 env[1201]: time="2025-09-06T00:28:49.854452247Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 6 00:28:49.890411 kubelet[2027]: I0906 00:28:49.890026 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-n4xzw" podStartSLOduration=1.889999507 podStartE2EDuration="1.889999507s" podCreationTimestamp="2025-09-06 00:28:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 00:28:49.888540379 +0000 UTC m=+5.388487120" watchObservedRunningTime="2025-09-06 00:28:49.889999507 +0000 UTC m=+5.389946244" Sep 6 00:28:50.147515 systemd[1]: run-containerd-runc-k8s.io-231f88de88952c16ba529f00740eae675302df87d6bfd498a48103f2ba9adb79-runc.WnVf9t.mount: Deactivated successfully. Sep 6 00:28:50.356000 audit[2227]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.359358 kernel: kauditd_printk_skb: 163 callbacks suppressed Sep 6 00:28:50.359453 kernel: audit: type=1325 audit(1757118530.356:850): table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.356000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0520e0c0 a2=0 a3=7fff0520e0ac items=0 ppid=2136 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.386004 kernel: audit: type=1300 audit(1757118530.356:850): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0520e0c0 a2=0 a3=7fff0520e0ac items=0 ppid=2136 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:28:50.359000 audit[2226]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.396686 kernel: audit: type=1327 audit(1757118530.356:850): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:28:50.396824 kernel: audit: type=1325 audit(1757118530.359:851): table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.396884 kernel: audit: type=1300 audit(1757118530.359:851): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed5774640 a2=0 a3=7ffed577462c items=0 ppid=2136 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.359000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed5774640 a2=0 a3=7ffed577462c items=0 ppid=2136 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:28:50.409055 kernel: audit: type=1327 audit(1757118530.359:851): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 00:28:50.365000 audit[2229]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.365000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa77afee0 a2=0 a3=7fffa77afecc items=0 ppid=2136 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.422618 kernel: audit: type=1325 audit(1757118530.365:852): table=nat:40 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.422733 kernel: audit: type=1300 audit(1757118530.365:852): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa77afee0 a2=0 a3=7fffa77afecc items=0 ppid=2136 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.422787 kernel: audit: type=1327 audit(1757118530.365:852): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:28:50.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:28:50.368000 audit[2230]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.430550 kernel: audit: type=1325 audit(1757118530.368:853): table=nat:41 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.368000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe52e0180 a2=0 a3=7fffe52e016c items=0 ppid=2136 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 00:28:50.383000 audit[2231]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.383000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbdca0380 a2=0 a3=7ffdbdca036c items=0 ppid=2136 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.386000 audit[2234]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.386000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc98345f70 a2=0 a3=7ffc98345f5c items=0 ppid=2136 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:28:50.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 00:28:50.477000 audit[2235]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.477000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6d13d2c0 a2=0 a3=7fff6d13d2ac items=0 ppid=2136 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:28:50.489000 audit[2237]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.489000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffd2c50550 a2=0 a3=7fffd2c5053c items=0 ppid=2136 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 00:28:50.497000 audit[2240]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.497000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff7e85e60 a2=0 a3=7ffff7e85e4c items=0 ppid=2136 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 00:28:50.501000 audit[2241]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.501000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdeb4bb90 a2=0 a3=7ffcdeb4bb7c items=0 ppid=2136 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:28:50.506000 audit[2243]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.506000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4af6a810 a2=0 a3=7ffe4af6a7fc items=0 ppid=2136 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:28:50.508000 audit[2244]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.508000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9d9c30f0 a2=0 a3=7fff9d9c30dc items=0 ppid=2136 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:28:50.512000 audit[2246]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.512000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeec870ba0 a2=0 a3=7ffeec870b8c items=0 ppid=2136 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:28:50.520000 audit[2249]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.520000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3bf09850 a2=0 a3=7fff3bf0983c items=0 ppid=2136 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 00:28:50.522000 audit[2250]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.522000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff651eb0d0 a2=0 a3=7fff651eb0bc items=0 ppid=2136 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:28:50.527000 audit[2252]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.527000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6b734a40 a2=0 a3=7fff6b734a2c items=0 ppid=2136 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:28:50.529000 audit[2253]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.529000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd388ee800 a2=0 a3=7ffd388ee7ec items=0 ppid=2136 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:28:50.535000 audit[2255]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.535000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccbbea9e0 a2=0 a3=7ffccbbea9cc items=0 ppid=2136 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:28:50.545000 audit[2258]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.545000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc526543d0 a2=0 a3=7ffc526543bc items=0 ppid=2136 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:28:50.553000 audit[2261]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.553000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3a5e0910 a2=0 a3=7ffe3a5e08fc items=0 ppid=2136 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:28:50.555000 audit[2262]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.555000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3c264290 a2=0 a3=7ffc3c26427c items=0 ppid=2136 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:28:50.560000 audit[2264]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.560000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc30f03f10 a2=0 a3=7ffc30f03efc items=0 ppid=2136 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:28:50.569000 audit[2267]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.569000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca0b6e890 a2=0 a3=7ffca0b6e87c items=0 ppid=2136 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:28:50.573000 audit[2268]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.573000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe98731c20 a2=0 a3=7ffe98731c0c items=0 ppid=2136 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:28:50.579000 audit[2270]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 00:28:50.579000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd0649f8e0 a2=0 a3=7ffd0649f8cc items=0 ppid=2136 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:28:50.637000 audit[2276]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:28:50.637000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc5b487420 a2=0 a3=7ffc5b48740c items=0 ppid=2136 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:28:50.649000 audit[2276]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:28:50.649000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc5b487420 a2=0 a3=7ffc5b48740c items=0 ppid=2136 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:28:50.651000 audit[2281]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.651000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc713c6120 a2=0 a3=7ffc713c610c items=0 ppid=2136 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 00:28:50.656000 audit[2283]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.656000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff0786fa00 a2=0 a3=7fff0786f9ec items=0 ppid=2136 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 00:28:50.665000 audit[2286]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.665000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcefe2c140 a2=0 a3=7ffcefe2c12c items=0 ppid=2136 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 00:28:50.670000 audit[2287]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.670000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2a252660 a2=0 a3=7ffd2a25264c items=0 ppid=2136 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 00:28:50.674000 audit[2289]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.674000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd90cbb210 a2=0 a3=7ffd90cbb1fc items=0 ppid=2136 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 00:28:50.676000 audit[2290]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.676000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5bfa8c60 a2=0 a3=7fff5bfa8c4c items=0 ppid=2136 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 00:28:50.681000 audit[2292]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.681000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefcd08010 a2=0 a3=7ffefcd07ffc items=0 ppid=2136 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 00:28:50.687000 audit[2295]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.687000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc8e6ade70 a2=0 a3=7ffc8e6ade5c items=0 ppid=2136 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 00:28:50.689000 audit[2296]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.689000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea8fc6ee0 a2=0 a3=7ffea8fc6ecc items=0 ppid=2136 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 00:28:50.693000 audit[2298]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.693000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe74c15080 a2=0 a3=7ffe74c1506c items=0 ppid=2136 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 00:28:50.695000 audit[2299]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.695000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3e3d55e0 a2=0 a3=7ffd3e3d55cc items=0 ppid=2136 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 00:28:50.700000 audit[2301]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.700000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffced622e0 a2=0 a3=7fffced622cc items=0 ppid=2136 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 00:28:50.716000 audit[2304]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.716000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff01c33fa0 a2=0 a3=7fff01c33f8c items=0 ppid=2136 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 00:28:50.724000 audit[2307]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.724000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb49fb600 a2=0 a3=7ffeb49fb5ec items=0 ppid=2136 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 00:28:50.726000 audit[2308]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.726000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe6588c70 a2=0 a3=7fffe6588c5c items=0 ppid=2136 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 00:28:50.729000 audit[2310]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.729000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff93f0f990 a2=0 a3=7fff93f0f97c items=0 ppid=2136 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:28:50.735000 audit[2313]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.735000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcaf38f770 a2=0 a3=7ffcaf38f75c items=0 ppid=2136 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 00:28:50.737000 audit[2314]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.737000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8921b010 a2=0 a3=7ffe8921affc items=0 ppid=2136 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 00:28:50.741000 audit[2316]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.741000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd3a66aa0 a2=0 a3=7fffd3a66a8c items=0 ppid=2136 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 00:28:50.745000 audit[2317]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.745000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe11d617e0 a2=0 a3=7ffe11d617cc items=0 ppid=2136 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 00:28:50.748000 audit[2319]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.748000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3946ebf0 a2=0 a3=7ffc3946ebdc items=0 ppid=2136 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:28:50.754000 audit[2322]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 00:28:50.754000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7f0159f0 a2=0 a3=7ffe7f0159dc items=0 ppid=2136 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 00:28:50.759000 audit[2324]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:28:50.759000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd9c810f10 a2=0 a3=7ffd9c810efc items=0 ppid=2136 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.759000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:28:50.760000 audit[2324]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 00:28:50.760000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd9c810f10 a2=0 a3=7ffd9c810efc items=0 ppid=2136 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:50.760000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:28:52.273401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1778280592.mount: Deactivated successfully. Sep 6 00:28:53.852321 env[1201]: time="2025-09-06T00:28:53.852125412Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:53.857310 env[1201]: time="2025-09-06T00:28:53.857260697Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:53.860873 env[1201]: time="2025-09-06T00:28:53.860821614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:53.865456 env[1201]: time="2025-09-06T00:28:53.865400020Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:28:53.866496 env[1201]: time="2025-09-06T00:28:53.866445924Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 6 00:28:53.886308 env[1201]: time="2025-09-06T00:28:53.884599125Z" level=info msg="CreateContainer within sandbox \"861a166e0fdf8c8441e4122ea4f7d3afc21a23b4872830364a61667f568cd092\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 6 00:28:53.938662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount745127091.mount: Deactivated successfully. Sep 6 00:28:53.951502 env[1201]: time="2025-09-06T00:28:53.951080668Z" level=info msg="CreateContainer within sandbox \"861a166e0fdf8c8441e4122ea4f7d3afc21a23b4872830364a61667f568cd092\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7b29d833fb8a3fbcf7cfc8ff4a4043a8efb52d7bcb7b6e4d2aa2edd0ed542b5a\"" Sep 6 00:28:53.956207 env[1201]: time="2025-09-06T00:28:53.956162300Z" level=info msg="StartContainer for \"7b29d833fb8a3fbcf7cfc8ff4a4043a8efb52d7bcb7b6e4d2aa2edd0ed542b5a\"" Sep 6 00:28:54.007007 systemd[1]: Started cri-containerd-7b29d833fb8a3fbcf7cfc8ff4a4043a8efb52d7bcb7b6e4d2aa2edd0ed542b5a.scope. Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.040000 audit: BPF prog-id=117 op=LOAD Sep 6 00:28:54.041000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.041000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2159 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:54.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323964383333666238613366626366376366633866663461343034 Sep 6 00:28:54.042000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.042000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2159 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:54.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323964383333666238613366626366376366633866663461343034 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.043000 audit: BPF prog-id=118 op=LOAD Sep 6 00:28:54.043000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d5110 items=0 ppid=2159 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:54.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323964383333666238613366626366376366633866663461343034 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.044000 audit: BPF prog-id=119 op=LOAD Sep 6 00:28:54.044000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d5158 items=0 ppid=2159 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:54.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323964383333666238613366626366376366633866663461343034 Sep 6 00:28:54.046000 audit: BPF prog-id=119 op=UNLOAD Sep 6 00:28:54.046000 audit: BPF prog-id=118 op=UNLOAD Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:28:54.046000 audit: BPF prog-id=120 op=LOAD Sep 6 00:28:54.046000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5568 items=0 ppid=2159 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:28:54.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762323964383333666238613366626366376366633866663461343034 Sep 6 00:28:54.076710 env[1201]: time="2025-09-06T00:28:54.076621004Z" level=info msg="StartContainer for \"7b29d833fb8a3fbcf7cfc8ff4a4043a8efb52d7bcb7b6e4d2aa2edd0ed542b5a\" returns successfully" Sep 6 00:29:02.159722 kernel: kauditd_printk_skb: 200 callbacks suppressed Sep 6 00:29:02.160472 kernel: audit: type=1106 audit(1757118542.149:919): pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:29:02.149000 audit[1381]: USER_END pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:29:02.150694 sudo[1381]: pam_unix(sudo:session): session closed for user root Sep 6 00:29:02.150000 audit[1381]: CRED_DISP pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:29:02.169137 kernel: audit: type=1104 audit(1757118542.150:920): pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 00:29:02.319536 sshd[1378]: pam_unix(sshd:session): session closed for user core Sep 6 00:29:02.326000 audit[1378]: USER_END pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:29:02.336475 kernel: audit: type=1106 audit(1757118542.326:921): pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:29:02.326000 audit[1378]: CRED_DISP pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:29:02.344182 kernel: audit: type=1104 audit(1757118542.326:922): pid=1378 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:29:02.346853 systemd[1]: sshd@8-10.244.9.98:22-139.178.89.65:36592.service: Deactivated successfully. Sep 6 00:29:02.349572 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 00:29:02.350294 systemd[1]: session-9.scope: Consumed 10.121s CPU time. Sep 6 00:29:02.351794 systemd-logind[1185]: Session 9 logged out. Waiting for processes to exit. Sep 6 00:29:02.354082 systemd-logind[1185]: Removed session 9. Sep 6 00:29:02.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.9.98:22-139.178.89.65:36592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:29:02.363131 kernel: audit: type=1131 audit(1757118542.346:923): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.9.98:22-139.178.89.65:36592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:29:03.147000 audit[2411]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:03.161836 kernel: audit: type=1325 audit(1757118543.147:924): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:03.162013 kernel: audit: type=1300 audit(1757118543.147:924): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffee21eeeb0 a2=0 a3=7ffee21eee9c items=0 ppid=2136 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:03.147000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffee21eeeb0 a2=0 a3=7ffee21eee9c items=0 ppid=2136 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:03.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:03.169113 kernel: audit: type=1327 audit(1757118543.147:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:03.168000 audit[2411]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:03.175131 kernel: audit: type=1325 audit(1757118543.168:925): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:03.168000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee21eeeb0 a2=0 a3=0 items=0 ppid=2136 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:03.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:03.185146 kernel: audit: type=1300 audit(1757118543.168:925): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee21eeeb0 a2=0 a3=0 items=0 ppid=2136 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:03.207000 audit[2413]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:03.207000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc75550860 a2=0 a3=7ffc7555084c items=0 ppid=2136 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:03.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:03.213000 audit[2413]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:03.213000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc75550860 a2=0 a3=0 items=0 ppid=2136 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:03.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:06.946000 audit[2419]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:06.946000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd485b2f40 a2=0 a3=7ffd485b2f2c items=0 ppid=2136 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:06.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:06.960000 audit[2419]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:06.960000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd485b2f40 a2=0 a3=0 items=0 ppid=2136 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:06.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:06.996000 audit[2421]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:06.996000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcb5726ef0 a2=0 a3=7ffcb5726edc items=0 ppid=2136 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:06.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:07.006000 audit[2421]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:07.006000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb5726ef0 a2=0 a3=0 items=0 ppid=2136 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:07.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:07.069314 kubelet[2027]: I0906 00:29:07.069178 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-755d956888-k45p8" podStartSLOduration=14.050642841 podStartE2EDuration="18.06905326s" podCreationTimestamp="2025-09-06 00:28:49 +0000 UTC" firstStartedPulling="2025-09-06 00:28:49.851009869 +0000 UTC m=+5.350956601" lastFinishedPulling="2025-09-06 00:28:53.869420283 +0000 UTC m=+9.369367020" observedRunningTime="2025-09-06 00:28:54.916837448 +0000 UTC m=+10.416784198" watchObservedRunningTime="2025-09-06 00:29:07.06905326 +0000 UTC m=+22.569000010" Sep 6 00:29:07.132232 systemd[1]: Created slice kubepods-besteffort-pod998ac50f_ab85_4fc9_b5f1_47f780a9abaf.slice. Sep 6 00:29:07.215981 kubelet[2027]: I0906 00:29:07.215593 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/998ac50f-ab85-4fc9-b5f1-47f780a9abaf-typha-certs\") pod \"calico-typha-cdf6ddc8d-kff5t\" (UID: \"998ac50f-ab85-4fc9-b5f1-47f780a9abaf\") " pod="calico-system/calico-typha-cdf6ddc8d-kff5t" Sep 6 00:29:07.216478 kubelet[2027]: I0906 00:29:07.216420 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s7rj8\" (UniqueName: \"kubernetes.io/projected/998ac50f-ab85-4fc9-b5f1-47f780a9abaf-kube-api-access-s7rj8\") pod \"calico-typha-cdf6ddc8d-kff5t\" (UID: \"998ac50f-ab85-4fc9-b5f1-47f780a9abaf\") " pod="calico-system/calico-typha-cdf6ddc8d-kff5t" Sep 6 00:29:07.216638 kubelet[2027]: I0906 00:29:07.216607 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/998ac50f-ab85-4fc9-b5f1-47f780a9abaf-tigera-ca-bundle\") pod \"calico-typha-cdf6ddc8d-kff5t\" (UID: \"998ac50f-ab85-4fc9-b5f1-47f780a9abaf\") " pod="calico-system/calico-typha-cdf6ddc8d-kff5t" Sep 6 00:29:07.409759 systemd[1]: Created slice kubepods-besteffort-pod53d4343a_5ac4_47a5_b73d_9990e4b8e098.slice. Sep 6 00:29:07.450712 env[1201]: time="2025-09-06T00:29:07.449605922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-cdf6ddc8d-kff5t,Uid:998ac50f-ab85-4fc9-b5f1-47f780a9abaf,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:07.530217 env[1201]: time="2025-09-06T00:29:07.529055587Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:07.530217 env[1201]: time="2025-09-06T00:29:07.529252090Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:07.530217 env[1201]: time="2025-09-06T00:29:07.529308447Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:07.530217 env[1201]: time="2025-09-06T00:29:07.530049070Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0619b6d74315129e95495b59b3adf3c52aced4b030218624866b6e62f1f782f9 pid=2433 runtime=io.containerd.runc.v2 Sep 6 00:29:07.571500 kubelet[2027]: I0906 00:29:07.557761 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-var-lib-calico\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.571500 kubelet[2027]: I0906 00:29:07.557862 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mgznc\" (UniqueName: \"kubernetes.io/projected/53d4343a-5ac4-47a5-b73d-9990e4b8e098-kube-api-access-mgznc\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.571500 kubelet[2027]: I0906 00:29:07.557910 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-cni-log-dir\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.571500 kubelet[2027]: I0906 00:29:07.557962 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/53d4343a-5ac4-47a5-b73d-9990e4b8e098-node-certs\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.571500 kubelet[2027]: I0906 00:29:07.557989 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-policysync\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572113 kubelet[2027]: I0906 00:29:07.558040 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-flexvol-driver-host\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572113 kubelet[2027]: I0906 00:29:07.558071 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53d4343a-5ac4-47a5-b73d-9990e4b8e098-tigera-ca-bundle\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572113 kubelet[2027]: I0906 00:29:07.558154 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-xtables-lock\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572113 kubelet[2027]: I0906 00:29:07.558226 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-lib-modules\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572113 kubelet[2027]: I0906 00:29:07.558334 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-cni-bin-dir\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572481 kubelet[2027]: I0906 00:29:07.558397 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-cni-net-dir\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.572481 kubelet[2027]: I0906 00:29:07.558457 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/53d4343a-5ac4-47a5-b73d-9990e4b8e098-var-run-calico\") pod \"calico-node-sr4bx\" (UID: \"53d4343a-5ac4-47a5-b73d-9990e4b8e098\") " pod="calico-system/calico-node-sr4bx" Sep 6 00:29:07.585490 systemd[1]: Started cri-containerd-0619b6d74315129e95495b59b3adf3c52aced4b030218624866b6e62f1f782f9.scope. Sep 6 00:29:07.673291 kubelet[2027]: E0906 00:29:07.673217 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:07.678429 kubelet[2027]: E0906 00:29:07.678371 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.678429 kubelet[2027]: W0906 00:29:07.678419 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.678716 kubelet[2027]: E0906 00:29:07.678477 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.684447 kubelet[2027]: E0906 00:29:07.684399 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.684447 kubelet[2027]: W0906 00:29:07.684433 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.684743 kubelet[2027]: E0906 00:29:07.684464 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.687286 kubelet[2027]: E0906 00:29:07.687246 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.687286 kubelet[2027]: W0906 00:29:07.687279 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.687551 kubelet[2027]: E0906 00:29:07.687310 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.687990 kubelet[2027]: E0906 00:29:07.687948 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.687990 kubelet[2027]: W0906 00:29:07.687972 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.688178 kubelet[2027]: E0906 00:29:07.687991 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.688449 kubelet[2027]: E0906 00:29:07.688423 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.688449 kubelet[2027]: W0906 00:29:07.688444 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.688596 kubelet[2027]: E0906 00:29:07.688464 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.688871 kubelet[2027]: E0906 00:29:07.688844 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.688994 kubelet[2027]: W0906 00:29:07.688897 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.688994 kubelet[2027]: E0906 00:29:07.688940 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.690338 kubelet[2027]: E0906 00:29:07.690309 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.690338 kubelet[2027]: W0906 00:29:07.690333 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.690533 kubelet[2027]: E0906 00:29:07.690373 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.690870 kubelet[2027]: E0906 00:29:07.690811 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.690870 kubelet[2027]: W0906 00:29:07.690844 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.690870 kubelet[2027]: E0906 00:29:07.690862 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.691309 kubelet[2027]: E0906 00:29:07.691284 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.691309 kubelet[2027]: W0906 00:29:07.691304 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.691471 kubelet[2027]: E0906 00:29:07.691321 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.693213 kubelet[2027]: E0906 00:29:07.693182 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.693213 kubelet[2027]: W0906 00:29:07.693205 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.693416 kubelet[2027]: E0906 00:29:07.693224 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.693719 kubelet[2027]: E0906 00:29:07.693693 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.693719 kubelet[2027]: W0906 00:29:07.693714 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.693885 kubelet[2027]: E0906 00:29:07.693731 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.694194 kubelet[2027]: E0906 00:29:07.694158 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.694194 kubelet[2027]: W0906 00:29:07.694175 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.694194 kubelet[2027]: E0906 00:29:07.694191 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.694664 kubelet[2027]: E0906 00:29:07.694635 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.694664 kubelet[2027]: W0906 00:29:07.694660 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.694844 kubelet[2027]: E0906 00:29:07.694678 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.697228 kubelet[2027]: E0906 00:29:07.697194 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.697228 kubelet[2027]: W0906 00:29:07.697221 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.697512 kubelet[2027]: E0906 00:29:07.697243 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.697816 kubelet[2027]: E0906 00:29:07.697790 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.697816 kubelet[2027]: W0906 00:29:07.697811 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.697972 kubelet[2027]: E0906 00:29:07.697839 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.698273 kubelet[2027]: E0906 00:29:07.698244 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.698273 kubelet[2027]: W0906 00:29:07.698265 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.698454 kubelet[2027]: E0906 00:29:07.698282 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.699017 kubelet[2027]: E0906 00:29:07.698968 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.699017 kubelet[2027]: W0906 00:29:07.698995 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.699017 kubelet[2027]: E0906 00:29:07.699012 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.699486 kubelet[2027]: E0906 00:29:07.699425 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.699486 kubelet[2027]: W0906 00:29:07.699445 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.699486 kubelet[2027]: E0906 00:29:07.699462 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.700022 kubelet[2027]: E0906 00:29:07.699957 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.700022 kubelet[2027]: W0906 00:29:07.700018 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.700201 kubelet[2027]: E0906 00:29:07.700038 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.700537 kubelet[2027]: E0906 00:29:07.700510 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.700629 kubelet[2027]: W0906 00:29:07.700541 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.700629 kubelet[2027]: E0906 00:29:07.700561 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.703245 kubelet[2027]: E0906 00:29:07.703196 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.703245 kubelet[2027]: W0906 00:29:07.703225 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.703245 kubelet[2027]: E0906 00:29:07.703249 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.723249 kubelet[2027]: E0906 00:29:07.723205 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.723517 kubelet[2027]: W0906 00:29:07.723485 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.723722 kubelet[2027]: E0906 00:29:07.723656 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.763584 kubelet[2027]: E0906 00:29:07.763536 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.763584 kubelet[2027]: W0906 00:29:07.763571 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.763872 kubelet[2027]: E0906 00:29:07.763601 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.763872 kubelet[2027]: I0906 00:29:07.763643 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x66wh\" (UniqueName: \"kubernetes.io/projected/1debf633-9211-4db0-9299-eca2c0eba673-kube-api-access-x66wh\") pod \"csi-node-driver-ttshf\" (UID: \"1debf633-9211-4db0-9299-eca2c0eba673\") " pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:07.764290 kubelet[2027]: E0906 00:29:07.764259 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.764290 kubelet[2027]: W0906 00:29:07.764286 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.764415 kubelet[2027]: E0906 00:29:07.764305 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.764415 kubelet[2027]: I0906 00:29:07.764337 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1debf633-9211-4db0-9299-eca2c0eba673-kubelet-dir\") pod \"csi-node-driver-ttshf\" (UID: \"1debf633-9211-4db0-9299-eca2c0eba673\") " pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:07.764895 kubelet[2027]: E0906 00:29:07.764856 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.764895 kubelet[2027]: W0906 00:29:07.764879 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.765048 kubelet[2027]: E0906 00:29:07.764897 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.765048 kubelet[2027]: I0906 00:29:07.764929 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1debf633-9211-4db0-9299-eca2c0eba673-registration-dir\") pod \"csi-node-driver-ttshf\" (UID: \"1debf633-9211-4db0-9299-eca2c0eba673\") " pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:07.765434 kubelet[2027]: E0906 00:29:07.765389 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.765434 kubelet[2027]: W0906 00:29:07.765433 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.765574 kubelet[2027]: E0906 00:29:07.765454 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.765730 kubelet[2027]: I0906 00:29:07.765702 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1debf633-9211-4db0-9299-eca2c0eba673-varrun\") pod \"csi-node-driver-ttshf\" (UID: \"1debf633-9211-4db0-9299-eca2c0eba673\") " pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:07.766041 kubelet[2027]: E0906 00:29:07.766005 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.766041 kubelet[2027]: W0906 00:29:07.766035 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.766193 kubelet[2027]: E0906 00:29:07.766054 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.766534 kubelet[2027]: E0906 00:29:07.766490 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.766534 kubelet[2027]: W0906 00:29:07.766520 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.766671 kubelet[2027]: E0906 00:29:07.766537 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.769292 kubelet[2027]: E0906 00:29:07.769257 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.769292 kubelet[2027]: W0906 00:29:07.769285 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.769482 kubelet[2027]: E0906 00:29:07.769308 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.769873 kubelet[2027]: E0906 00:29:07.769749 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.769873 kubelet[2027]: W0906 00:29:07.769770 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.769873 kubelet[2027]: E0906 00:29:07.769788 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.770353 kubelet[2027]: E0906 00:29:07.770273 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.770353 kubelet[2027]: W0906 00:29:07.770304 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.770353 kubelet[2027]: E0906 00:29:07.770322 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.770542 kubelet[2027]: I0906 00:29:07.770495 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1debf633-9211-4db0-9299-eca2c0eba673-socket-dir\") pod \"csi-node-driver-ttshf\" (UID: \"1debf633-9211-4db0-9299-eca2c0eba673\") " pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:07.770900 kubelet[2027]: E0906 00:29:07.770866 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.770900 kubelet[2027]: W0906 00:29:07.770887 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.771047 kubelet[2027]: E0906 00:29:07.770905 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.771362 kubelet[2027]: E0906 00:29:07.771321 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.771362 kubelet[2027]: W0906 00:29:07.771359 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.771545 kubelet[2027]: E0906 00:29:07.771377 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.771858 kubelet[2027]: E0906 00:29:07.771800 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.771858 kubelet[2027]: W0906 00:29:07.771853 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.772030 kubelet[2027]: E0906 00:29:07.771876 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.772415 kubelet[2027]: E0906 00:29:07.772304 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.772415 kubelet[2027]: W0906 00:29:07.772374 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.772415 kubelet[2027]: E0906 00:29:07.772413 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.775308 kubelet[2027]: E0906 00:29:07.775259 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.775308 kubelet[2027]: W0906 00:29:07.775294 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.775525 kubelet[2027]: E0906 00:29:07.775334 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.775869 kubelet[2027]: E0906 00:29:07.775832 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.775869 kubelet[2027]: W0906 00:29:07.775854 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.776066 kubelet[2027]: E0906 00:29:07.775871 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.788188 kernel: kauditd_printk_skb: 19 callbacks suppressed Sep 6 00:29:07.788421 kernel: audit: type=1400 audit(1757118547.780:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.796524 kernel: audit: type=1400 audit(1757118547.780:933): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.809143 kernel: audit: type=1400 audit(1757118547.780:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.822515 kernel: audit: type=1400 audit(1757118547.780:935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.822699 kernel: audit: type=1400 audit(1757118547.780:936): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.841140 kernel: audit: type=1400 audit(1757118547.780:937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.841353 kernel: audit: type=1400 audit(1757118547.780:938): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.873119 kernel: audit: type=1400 audit(1757118547.780:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.873675 kubelet[2027]: E0906 00:29:07.873636 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.873675 kubelet[2027]: W0906 00:29:07.873669 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.873882 kubelet[2027]: E0906 00:29:07.873698 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.879132 kernel: audit: type=1400 audit(1757118547.780:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.879345 kubelet[2027]: E0906 00:29:07.879312 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.879345 kubelet[2027]: W0906 00:29:07.879342 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.879546 kubelet[2027]: E0906 00:29:07.879369 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.879753 kubelet[2027]: E0906 00:29:07.879729 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.879753 kubelet[2027]: W0906 00:29:07.879749 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.879995 kubelet[2027]: E0906 00:29:07.879765 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.880634 kubelet[2027]: E0906 00:29:07.880608 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.880816 kubelet[2027]: W0906 00:29:07.880768 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.880966 kubelet[2027]: E0906 00:29:07.880939 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.881496 kubelet[2027]: E0906 00:29:07.881473 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.881636 kubelet[2027]: W0906 00:29:07.881610 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.881771 kubelet[2027]: E0906 00:29:07.881743 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.882197 kubelet[2027]: E0906 00:29:07.882175 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.882319 kubelet[2027]: W0906 00:29:07.882293 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.882479 kubelet[2027]: E0906 00:29:07.882453 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.882940 kubelet[2027]: E0906 00:29:07.882918 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.883070 kubelet[2027]: W0906 00:29:07.883045 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.883255 kubelet[2027]: E0906 00:29:07.883230 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.883718 kubelet[2027]: E0906 00:29:07.883694 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.883861 kubelet[2027]: W0906 00:29:07.883834 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.883988 kubelet[2027]: E0906 00:29:07.883962 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.884406 kubelet[2027]: E0906 00:29:07.884384 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.884556 kubelet[2027]: W0906 00:29:07.884530 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.884672 kubelet[2027]: E0906 00:29:07.884646 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.885639 kubelet[2027]: E0906 00:29:07.885617 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.885760 kubelet[2027]: W0906 00:29:07.885734 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.885927 kubelet[2027]: E0906 00:29:07.885867 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.886427 kubelet[2027]: E0906 00:29:07.886406 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.886548 kubelet[2027]: W0906 00:29:07.886523 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.886665 kubelet[2027]: E0906 00:29:07.886639 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.889579 kubelet[2027]: E0906 00:29:07.889550 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.889778 kubelet[2027]: W0906 00:29:07.889750 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.889927 kubelet[2027]: E0906 00:29:07.889899 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.787000 audit: BPF prog-id=121 op=LOAD Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2433 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313962366437343331353132396539353439356235396233616466 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2433 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313962366437343331353132396539353439356235396233616466 Sep 6 00:29:07.891170 kernel: audit: type=1400 audit(1757118547.787:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit: BPF prog-id=122 op=LOAD Sep 6 00:29:07.794000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e1b20 items=0 ppid=2433 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313962366437343331353132396539353439356235396233616466 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit: BPF prog-id=123 op=LOAD Sep 6 00:29:07.794000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e1b68 items=0 ppid=2433 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313962366437343331353132396539353439356235396233616466 Sep 6 00:29:07.794000 audit: BPF prog-id=123 op=UNLOAD Sep 6 00:29:07.794000 audit: BPF prog-id=122 op=UNLOAD Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:07.794000 audit: BPF prog-id=124 op=LOAD Sep 6 00:29:07.794000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e1f78 items=0 ppid=2433 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036313962366437343331353132396539353439356235396233616466 Sep 6 00:29:07.897682 kubelet[2027]: E0906 00:29:07.897637 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.897919 kubelet[2027]: W0906 00:29:07.897885 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.898074 kubelet[2027]: E0906 00:29:07.898046 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.898854 kubelet[2027]: E0906 00:29:07.898817 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.899008 kubelet[2027]: W0906 00:29:07.898982 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.903151 kubelet[2027]: E0906 00:29:07.899218 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.904269 kubelet[2027]: E0906 00:29:07.904228 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.904440 kubelet[2027]: W0906 00:29:07.904406 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.904713 kubelet[2027]: E0906 00:29:07.904679 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.905224 kubelet[2027]: E0906 00:29:07.905191 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.905369 kubelet[2027]: W0906 00:29:07.905343 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.905511 kubelet[2027]: E0906 00:29:07.905486 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.905943 kubelet[2027]: E0906 00:29:07.905921 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.906081 kubelet[2027]: W0906 00:29:07.906043 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.906284 kubelet[2027]: E0906 00:29:07.906256 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.906902 kubelet[2027]: E0906 00:29:07.906878 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.907045 kubelet[2027]: W0906 00:29:07.907019 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.907221 kubelet[2027]: E0906 00:29:07.907196 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.908881 kubelet[2027]: E0906 00:29:07.908839 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.908881 kubelet[2027]: W0906 00:29:07.908867 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.909100 kubelet[2027]: E0906 00:29:07.908891 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.911208 kubelet[2027]: E0906 00:29:07.909252 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.911208 kubelet[2027]: W0906 00:29:07.909274 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.911208 kubelet[2027]: E0906 00:29:07.909291 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.911986 kubelet[2027]: E0906 00:29:07.911895 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.911986 kubelet[2027]: W0906 00:29:07.911931 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.911986 kubelet[2027]: E0906 00:29:07.911973 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.913352 kubelet[2027]: E0906 00:29:07.913321 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.913352 kubelet[2027]: W0906 00:29:07.913345 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.913506 kubelet[2027]: E0906 00:29:07.913364 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.915154 kubelet[2027]: E0906 00:29:07.915121 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.915154 kubelet[2027]: W0906 00:29:07.915149 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.915295 kubelet[2027]: E0906 00:29:07.915170 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.916719 kubelet[2027]: E0906 00:29:07.916685 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.916719 kubelet[2027]: W0906 00:29:07.916716 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.916955 kubelet[2027]: E0906 00:29:07.916738 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.922409 kubelet[2027]: E0906 00:29:07.922350 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.922409 kubelet[2027]: W0906 00:29:07.922392 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.922668 kubelet[2027]: E0906 00:29:07.922481 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:07.987305 kubelet[2027]: E0906 00:29:07.987212 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:07.987305 kubelet[2027]: W0906 00:29:07.987243 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:07.987305 kubelet[2027]: E0906 00:29:07.987278 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:08.018074 env[1201]: time="2025-09-06T00:29:08.018006901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sr4bx,Uid:53d4343a-5ac4-47a5-b73d-9990e4b8e098,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:08.068000 audit[2536]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:08.068000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe5805e1a0 a2=0 a3=7ffe5805e18c items=0 ppid=2136 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:08.078991 env[1201]: time="2025-09-06T00:29:08.078925408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-cdf6ddc8d-kff5t,Uid:998ac50f-ab85-4fc9-b5f1-47f780a9abaf,Namespace:calico-system,Attempt:0,} returns sandbox id \"0619b6d74315129e95495b59b3adf3c52aced4b030218624866b6e62f1f782f9\"" Sep 6 00:29:08.083138 env[1201]: time="2025-09-06T00:29:08.082035005Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 6 00:29:08.090338 env[1201]: time="2025-09-06T00:29:08.089374473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:08.090338 env[1201]: time="2025-09-06T00:29:08.089462561Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:08.090338 env[1201]: time="2025-09-06T00:29:08.089481842Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:08.092285 env[1201]: time="2025-09-06T00:29:08.090870930Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751 pid=2541 runtime=io.containerd.runc.v2 Sep 6 00:29:08.104000 audit[2536]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:08.104000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5805e1a0 a2=0 a3=0 items=0 ppid=2136 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:08.119806 systemd[1]: Started cri-containerd-7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751.scope. Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.224000 audit: BPF prog-id=125 op=LOAD Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2541 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336561643232363061343464303639333236663165306532336263 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2541 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336561643232363061343464303639333236663165306532336263 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit: BPF prog-id=126 op=LOAD Sep 6 00:29:08.225000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021a360 items=0 ppid=2541 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336561643232363061343464303639333236663165306532336263 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit: BPF prog-id=127 op=LOAD Sep 6 00:29:08.225000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021a3a8 items=0 ppid=2541 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336561643232363061343464303639333236663165306532336263 Sep 6 00:29:08.225000 audit: BPF prog-id=127 op=UNLOAD Sep 6 00:29:08.225000 audit: BPF prog-id=126 op=UNLOAD Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:08.225000 audit: BPF prog-id=128 op=LOAD Sep 6 00:29:08.225000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021a7b8 items=0 ppid=2541 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:08.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766336561643232363061343464303639333236663165306532336263 Sep 6 00:29:08.273979 env[1201]: time="2025-09-06T00:29:08.273909300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sr4bx,Uid:53d4343a-5ac4-47a5-b73d-9990e4b8e098,Namespace:calico-system,Attempt:0,} returns sandbox id \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\"" Sep 6 00:29:08.386037 systemd[1]: run-containerd-runc-k8s.io-0619b6d74315129e95495b59b3adf3c52aced4b030218624866b6e62f1f782f9-runc.TPtuII.mount: Deactivated successfully. Sep 6 00:29:09.800195 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3090313901.mount: Deactivated successfully. Sep 6 00:29:09.817323 kubelet[2027]: E0906 00:29:09.816109 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:11.816224 kubelet[2027]: E0906 00:29:11.816043 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:11.993059 env[1201]: time="2025-09-06T00:29:11.992951648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:12.003430 env[1201]: time="2025-09-06T00:29:12.003192626Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:12.009528 env[1201]: time="2025-09-06T00:29:12.009470459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:12.018131 env[1201]: time="2025-09-06T00:29:12.017071329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:12.020004 env[1201]: time="2025-09-06T00:29:12.018265027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 6 00:29:12.025712 env[1201]: time="2025-09-06T00:29:12.025629609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 00:29:12.062015 env[1201]: time="2025-09-06T00:29:12.061863299Z" level=info msg="CreateContainer within sandbox \"0619b6d74315129e95495b59b3adf3c52aced4b030218624866b6e62f1f782f9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 6 00:29:12.098366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2177896358.mount: Deactivated successfully. Sep 6 00:29:12.112081 env[1201]: time="2025-09-06T00:29:12.112007953Z" level=info msg="CreateContainer within sandbox \"0619b6d74315129e95495b59b3adf3c52aced4b030218624866b6e62f1f782f9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"56be50d2829cbb7611aefa5a14b86e247ca0ddb2cb3248eebcd80ebd62d15770\"" Sep 6 00:29:12.116257 env[1201]: time="2025-09-06T00:29:12.113863203Z" level=info msg="StartContainer for \"56be50d2829cbb7611aefa5a14b86e247ca0ddb2cb3248eebcd80ebd62d15770\"" Sep 6 00:29:12.240607 systemd[1]: Started cri-containerd-56be50d2829cbb7611aefa5a14b86e247ca0ddb2cb3248eebcd80ebd62d15770.scope. Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.273000 audit: BPF prog-id=129 op=LOAD Sep 6 00:29:12.275000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.275000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2433 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:12.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536626535306432383239636262373631316165666135613134623836 Sep 6 00:29:12.276000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.276000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2433 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:12.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536626535306432383239636262373631316165666135613134623836 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.277000 audit: BPF prog-id=130 op=LOAD Sep 6 00:29:12.277000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00020aa80 items=0 ppid=2433 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:12.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536626535306432383239636262373631316165666135613134623836 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.278000 audit: BPF prog-id=131 op=LOAD Sep 6 00:29:12.278000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00020aac8 items=0 ppid=2433 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:12.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536626535306432383239636262373631316165666135613134623836 Sep 6 00:29:12.280000 audit: BPF prog-id=131 op=UNLOAD Sep 6 00:29:12.280000 audit: BPF prog-id=130 op=UNLOAD Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:12.280000 audit: BPF prog-id=132 op=LOAD Sep 6 00:29:12.280000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c00020aed8 items=0 ppid=2433 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:12.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536626535306432383239636262373631316165666135613134623836 Sep 6 00:29:12.339871 env[1201]: time="2025-09-06T00:29:12.339802413Z" level=info msg="StartContainer for \"56be50d2829cbb7611aefa5a14b86e247ca0ddb2cb3248eebcd80ebd62d15770\" returns successfully" Sep 6 00:29:12.992767 kubelet[2027]: E0906 00:29:12.992689 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:12.993543 kubelet[2027]: W0906 00:29:12.993507 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:12.993776 kubelet[2027]: E0906 00:29:12.993719 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:12.995075 kubelet[2027]: E0906 00:29:12.995049 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:12.995322 kubelet[2027]: W0906 00:29:12.995293 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:12.995511 kubelet[2027]: E0906 00:29:12.995484 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:12.996203 kubelet[2027]: E0906 00:29:12.996170 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:12.996388 kubelet[2027]: W0906 00:29:12.996360 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:12.996542 kubelet[2027]: E0906 00:29:12.996516 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:12.997287 kubelet[2027]: E0906 00:29:12.997254 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:12.997444 kubelet[2027]: W0906 00:29:12.997418 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:12.999067 kubelet[2027]: E0906 00:29:12.999039 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.002139 kubelet[2027]: E0906 00:29:13.001462 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.002139 kubelet[2027]: W0906 00:29:13.001491 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.002139 kubelet[2027]: E0906 00:29:13.001514 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.002788 kubelet[2027]: E0906 00:29:13.002749 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.002788 kubelet[2027]: W0906 00:29:13.002776 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.002952 kubelet[2027]: E0906 00:29:13.002795 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.005141 kubelet[2027]: E0906 00:29:13.005078 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.005141 kubelet[2027]: W0906 00:29:13.005137 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.005325 kubelet[2027]: E0906 00:29:13.005160 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.005879 kubelet[2027]: E0906 00:29:13.005847 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.005879 kubelet[2027]: W0906 00:29:13.005870 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.006120 kubelet[2027]: E0906 00:29:13.005887 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.007406 kubelet[2027]: E0906 00:29:13.007378 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.007406 kubelet[2027]: W0906 00:29:13.007401 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.007564 kubelet[2027]: E0906 00:29:13.007419 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.009238 kubelet[2027]: E0906 00:29:13.009211 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.009341 kubelet[2027]: W0906 00:29:13.009264 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.009341 kubelet[2027]: E0906 00:29:13.009288 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.009710 kubelet[2027]: E0906 00:29:13.009684 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.009710 kubelet[2027]: W0906 00:29:13.009708 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.009868 kubelet[2027]: E0906 00:29:13.009726 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.012192 kubelet[2027]: E0906 00:29:13.012163 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.012192 kubelet[2027]: W0906 00:29:13.012187 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.012192 kubelet[2027]: E0906 00:29:13.012205 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.012515 kubelet[2027]: E0906 00:29:13.012492 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.012515 kubelet[2027]: W0906 00:29:13.012512 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.012663 kubelet[2027]: E0906 00:29:13.012528 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.012976 kubelet[2027]: E0906 00:29:13.012950 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.013104 kubelet[2027]: W0906 00:29:13.012981 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.013104 kubelet[2027]: E0906 00:29:13.012999 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.014287 kubelet[2027]: E0906 00:29:13.014259 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.014287 kubelet[2027]: W0906 00:29:13.014281 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.014451 kubelet[2027]: E0906 00:29:13.014302 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.046429 kubelet[2027]: E0906 00:29:13.046378 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.046716 kubelet[2027]: W0906 00:29:13.046685 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.047159 kubelet[2027]: E0906 00:29:13.047129 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.047838 kubelet[2027]: E0906 00:29:13.047812 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.048059 kubelet[2027]: W0906 00:29:13.047974 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.048273 kubelet[2027]: E0906 00:29:13.048247 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.048769 kubelet[2027]: E0906 00:29:13.048745 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.048899 kubelet[2027]: W0906 00:29:13.048874 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.049047 kubelet[2027]: E0906 00:29:13.049021 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.049685 kubelet[2027]: E0906 00:29:13.049650 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.049685 kubelet[2027]: W0906 00:29:13.049681 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.049910 kubelet[2027]: E0906 00:29:13.049704 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.050209 kubelet[2027]: E0906 00:29:13.050023 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.050209 kubelet[2027]: W0906 00:29:13.050068 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.050209 kubelet[2027]: E0906 00:29:13.050103 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.050389 kubelet[2027]: E0906 00:29:13.050354 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.050389 kubelet[2027]: W0906 00:29:13.050368 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.050494 kubelet[2027]: E0906 00:29:13.050393 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.051298 kubelet[2027]: E0906 00:29:13.051273 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.051298 kubelet[2027]: W0906 00:29:13.051294 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.051451 kubelet[2027]: E0906 00:29:13.051311 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.051614 kubelet[2027]: E0906 00:29:13.051587 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.051614 kubelet[2027]: W0906 00:29:13.051607 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.052176 kubelet[2027]: E0906 00:29:13.051623 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.055230 kubelet[2027]: E0906 00:29:13.055189 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.055230 kubelet[2027]: W0906 00:29:13.055217 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.055444 kubelet[2027]: E0906 00:29:13.055241 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.055591 kubelet[2027]: E0906 00:29:13.055566 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.055591 kubelet[2027]: W0906 00:29:13.055587 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.055766 kubelet[2027]: E0906 00:29:13.055603 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.056065 kubelet[2027]: E0906 00:29:13.056040 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.056065 kubelet[2027]: W0906 00:29:13.056061 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.056251 kubelet[2027]: E0906 00:29:13.056078 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.057208 kubelet[2027]: E0906 00:29:13.057184 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.057333 kubelet[2027]: W0906 00:29:13.057307 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.057466 kubelet[2027]: E0906 00:29:13.057440 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.058018 kubelet[2027]: E0906 00:29:13.057995 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.058194 kubelet[2027]: W0906 00:29:13.058168 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.058344 kubelet[2027]: E0906 00:29:13.058317 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.058829 kubelet[2027]: E0906 00:29:13.058806 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.058966 kubelet[2027]: W0906 00:29:13.058940 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.059149 kubelet[2027]: E0906 00:29:13.059065 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.059860 kubelet[2027]: E0906 00:29:13.059837 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.059984 kubelet[2027]: W0906 00:29:13.059959 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.060167 kubelet[2027]: E0906 00:29:13.060138 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.060678 kubelet[2027]: E0906 00:29:13.060656 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.060896 kubelet[2027]: W0906 00:29:13.060835 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.061016 kubelet[2027]: E0906 00:29:13.060991 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.061801 kubelet[2027]: E0906 00:29:13.061779 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.061925 kubelet[2027]: W0906 00:29:13.061899 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.062072 kubelet[2027]: E0906 00:29:13.062046 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.062525 kubelet[2027]: E0906 00:29:13.062504 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:13.062645 kubelet[2027]: W0906 00:29:13.062619 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:13.062794 kubelet[2027]: E0906 00:29:13.062767 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:13.738663 env[1201]: time="2025-09-06T00:29:13.738559211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:13.749923 env[1201]: time="2025-09-06T00:29:13.749856252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:13.758163 env[1201]: time="2025-09-06T00:29:13.758082592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:13.760451 env[1201]: time="2025-09-06T00:29:13.760401243Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:13.762041 env[1201]: time="2025-09-06T00:29:13.761998547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 00:29:13.771350 env[1201]: time="2025-09-06T00:29:13.771291869Z" level=info msg="CreateContainer within sandbox \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 00:29:13.808402 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2182573830.mount: Deactivated successfully. Sep 6 00:29:13.817147 kubelet[2027]: E0906 00:29:13.815841 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:13.817363 env[1201]: time="2025-09-06T00:29:13.816057757Z" level=info msg="CreateContainer within sandbox \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172\"" Sep 6 00:29:13.818556 env[1201]: time="2025-09-06T00:29:13.818517849Z" level=info msg="StartContainer for \"4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172\"" Sep 6 00:29:13.875620 systemd[1]: Started cri-containerd-4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172.scope. Sep 6 00:29:13.930000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938475 kernel: kauditd_printk_skb: 167 callbacks suppressed Sep 6 00:29:13.938769 kernel: audit: type=1400 audit(1757118553.930:988): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.930000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb2a9354a38 items=0 ppid=2541 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:13.950660 kernel: audit: type=1300 audit(1757118553.930:988): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb2a9354a38 items=0 ppid=2541 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:13.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343131623636353062396439353039343361326432626663383038 Sep 6 00:29:13.959162 kernel: audit: type=1327 audit(1757118553.930:988): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343131623636353062396439353039343361326432626663383038 Sep 6 00:29:13.963416 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.970466 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.979791 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.982532 kubelet[2027]: I0906 00:29:13.981276 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 00:29:13.987196 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.995253 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:14.002182 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:14.009149 kernel: audit: type=1400 audit(1757118553.938:989): avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.938000 audit: BPF prog-id=133 op=LOAD Sep 6 00:29:13.938000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cfd58 items=0 ppid=2541 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:13.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343131623636353062396439353039343361326432626663383038 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.942000 audit: BPF prog-id=134 op=LOAD Sep 6 00:29:13.942000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cfda8 items=0 ppid=2541 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:13.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343131623636353062396439353039343361326432626663383038 Sep 6 00:29:13.962000 audit: BPF prog-id=134 op=UNLOAD Sep 6 00:29:13.962000 audit: BPF prog-id=133 op=UNLOAD Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:13.962000 audit: BPF prog-id=135 op=LOAD Sep 6 00:29:13.962000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cfe38 items=0 ppid=2541 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:13.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465343131623636353062396439353039343361326432626663383038 Sep 6 00:29:14.021450 kubelet[2027]: E0906 00:29:14.021386 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.021450 kubelet[2027]: W0906 00:29:14.021436 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.022183 kubelet[2027]: E0906 00:29:14.021476 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.022183 kubelet[2027]: E0906 00:29:14.021788 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.022183 kubelet[2027]: W0906 00:29:14.021803 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.022183 kubelet[2027]: E0906 00:29:14.021819 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.022183 kubelet[2027]: E0906 00:29:14.022138 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.022183 kubelet[2027]: W0906 00:29:14.022154 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.022183 kubelet[2027]: E0906 00:29:14.022169 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.022576 kubelet[2027]: E0906 00:29:14.022422 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.022576 kubelet[2027]: W0906 00:29:14.022437 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.022576 kubelet[2027]: E0906 00:29:14.022452 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.022796 kubelet[2027]: E0906 00:29:14.022769 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.022796 kubelet[2027]: W0906 00:29:14.022791 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.022965 kubelet[2027]: E0906 00:29:14.022814 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.023139 kubelet[2027]: E0906 00:29:14.023114 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.023139 kubelet[2027]: W0906 00:29:14.023135 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.023309 kubelet[2027]: E0906 00:29:14.023151 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.023651 kubelet[2027]: E0906 00:29:14.023615 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.023651 kubelet[2027]: W0906 00:29:14.023635 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.023651 kubelet[2027]: E0906 00:29:14.023651 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.024376 kubelet[2027]: E0906 00:29:14.024344 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.024376 kubelet[2027]: W0906 00:29:14.024364 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.024536 kubelet[2027]: E0906 00:29:14.024380 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.024711 kubelet[2027]: E0906 00:29:14.024681 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.024711 kubelet[2027]: W0906 00:29:14.024703 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.024711 kubelet[2027]: E0906 00:29:14.024735 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.024711 kubelet[2027]: E0906 00:29:14.024994 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.024711 kubelet[2027]: W0906 00:29:14.025008 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.024711 kubelet[2027]: E0906 00:29:14.025023 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.024711 kubelet[2027]: E0906 00:29:14.025283 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.024711 kubelet[2027]: W0906 00:29:14.025297 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.024711 kubelet[2027]: E0906 00:29:14.025312 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.028414 kubelet[2027]: E0906 00:29:14.027907 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.028414 kubelet[2027]: W0906 00:29:14.027949 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.028414 kubelet[2027]: E0906 00:29:14.027974 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.028621 kubelet[2027]: E0906 00:29:14.028445 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.028621 kubelet[2027]: W0906 00:29:14.028466 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.028621 kubelet[2027]: E0906 00:29:14.028485 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.028913 kubelet[2027]: E0906 00:29:14.028890 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.028913 kubelet[2027]: W0906 00:29:14.028912 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.029058 kubelet[2027]: E0906 00:29:14.028929 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.029371 kubelet[2027]: E0906 00:29:14.029252 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.029371 kubelet[2027]: W0906 00:29:14.029277 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.029371 kubelet[2027]: E0906 00:29:14.029295 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.042618 systemd[1]: run-containerd-runc-k8s.io-4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172-runc.j1gTls.mount: Deactivated successfully. Sep 6 00:29:14.051110 env[1201]: time="2025-09-06T00:29:14.050989724Z" level=info msg="StartContainer for \"4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172\" returns successfully" Sep 6 00:29:14.059757 kubelet[2027]: E0906 00:29:14.059705 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.060153 kubelet[2027]: W0906 00:29:14.060036 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.060418 kubelet[2027]: E0906 00:29:14.060354 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.063466 kubelet[2027]: E0906 00:29:14.063434 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.063636 kubelet[2027]: W0906 00:29:14.063606 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.063898 kubelet[2027]: E0906 00:29:14.063870 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.064466 kubelet[2027]: E0906 00:29:14.064439 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.064676 kubelet[2027]: W0906 00:29:14.064631 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.064882 kubelet[2027]: E0906 00:29:14.064844 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.065431 kubelet[2027]: E0906 00:29:14.065399 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.065565 kubelet[2027]: W0906 00:29:14.065539 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.065801 kubelet[2027]: E0906 00:29:14.065704 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.067276 kubelet[2027]: E0906 00:29:14.067243 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.067425 kubelet[2027]: W0906 00:29:14.067399 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.067625 kubelet[2027]: E0906 00:29:14.067543 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.068159 kubelet[2027]: E0906 00:29:14.068134 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 00:29:14.071794 kubelet[2027]: W0906 00:29:14.071763 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 00:29:14.073360 systemd[1]: cri-containerd-4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172.scope: Deactivated successfully. Sep 6 00:29:14.074672 kubelet[2027]: E0906 00:29:14.074599 2027 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 00:29:14.077000 audit: BPF prog-id=135 op=UNLOAD Sep 6 00:29:14.143083 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172-rootfs.mount: Deactivated successfully. Sep 6 00:29:14.339491 env[1201]: time="2025-09-06T00:29:14.339307464Z" level=info msg="shim disconnected" id=4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172 Sep 6 00:29:14.341589 env[1201]: time="2025-09-06T00:29:14.339924012Z" level=warning msg="cleaning up after shim disconnected" id=4e411b6650b9d950943a2d2bfc808dcdf6186c31cdb068b947efa06959941172 namespace=k8s.io Sep 6 00:29:14.341589 env[1201]: time="2025-09-06T00:29:14.339960450Z" level=info msg="cleaning up dead shim" Sep 6 00:29:14.356634 env[1201]: time="2025-09-06T00:29:14.356538766Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:29:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2725 runtime=io.containerd.runc.v2\n" Sep 6 00:29:14.987405 env[1201]: time="2025-09-06T00:29:14.987340780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 00:29:15.045883 kubelet[2027]: I0906 00:29:15.045777 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-cdf6ddc8d-kff5t" podStartSLOduration=4.105794936 podStartE2EDuration="8.04564973s" podCreationTimestamp="2025-09-06 00:29:07 +0000 UTC" firstStartedPulling="2025-09-06 00:29:08.081102474 +0000 UTC m=+23.581049216" lastFinishedPulling="2025-09-06 00:29:12.020957271 +0000 UTC m=+27.520904010" observedRunningTime="2025-09-06 00:29:12.998994324 +0000 UTC m=+28.498941073" watchObservedRunningTime="2025-09-06 00:29:15.04564973 +0000 UTC m=+30.545596474" Sep 6 00:29:15.815103 kubelet[2027]: E0906 00:29:15.815028 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:17.821537 kubelet[2027]: E0906 00:29:17.815946 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:19.816647 kubelet[2027]: E0906 00:29:19.816460 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:21.820851 kubelet[2027]: E0906 00:29:21.815517 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:22.017819 env[1201]: time="2025-09-06T00:29:22.017669798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:22.083205 env[1201]: time="2025-09-06T00:29:22.082630464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:22.087070 env[1201]: time="2025-09-06T00:29:22.087023708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:22.090970 env[1201]: time="2025-09-06T00:29:22.090899855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:22.092449 env[1201]: time="2025-09-06T00:29:22.092337085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 00:29:22.108700 env[1201]: time="2025-09-06T00:29:22.108540349Z" level=info msg="CreateContainer within sandbox \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 00:29:22.144948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3172789166.mount: Deactivated successfully. Sep 6 00:29:22.159977 env[1201]: time="2025-09-06T00:29:22.159703089Z" level=info msg="CreateContainer within sandbox \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2\"" Sep 6 00:29:22.165785 env[1201]: time="2025-09-06T00:29:22.165242752Z" level=info msg="StartContainer for \"266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2\"" Sep 6 00:29:22.218909 systemd[1]: Started cri-containerd-266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2.scope. Sep 6 00:29:22.307040 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 00:29:22.307495 kernel: audit: type=1400 audit(1757118562.295:995): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.295000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.295000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f22ec3bcd08 items=0 ppid=2541 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:22.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363231316534326534326437373439326636303033613033313434 Sep 6 00:29:22.324264 kernel: audit: type=1300 audit(1757118562.295:995): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f22ec3bcd08 items=0 ppid=2541 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:22.324489 kernel: audit: type=1327 audit(1757118562.295:995): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363231316534326534326437373439326636303033613033313434 Sep 6 00:29:22.325936 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.343651 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.343825 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.343894 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.356299 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.356498 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.363175 kernel: audit: type=1400 audit(1757118562.306:996): avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit: BPF prog-id=136 op=LOAD Sep 6 00:29:22.306000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000324978 items=0 ppid=2541 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:22.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363231316534326534326437373439326636303033613033313434 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.306000 audit: BPF prog-id=137 op=LOAD Sep 6 00:29:22.306000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003249c8 items=0 ppid=2541 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:22.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363231316534326534326437373439326636303033613033313434 Sep 6 00:29:22.307000 audit: BPF prog-id=137 op=UNLOAD Sep 6 00:29:22.307000 audit: BPF prog-id=136 op=UNLOAD Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { perfmon } for pid=2749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:22.307000 audit: BPF prog-id=138 op=LOAD Sep 6 00:29:22.307000 audit[2749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000324a58 items=0 ppid=2541 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:22.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363231316534326534326437373439326636303033613033313434 Sep 6 00:29:22.391698 env[1201]: time="2025-09-06T00:29:22.391589798Z" level=info msg="StartContainer for \"266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2\" returns successfully" Sep 6 00:29:23.661878 kubelet[2027]: I0906 00:29:23.661764 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 00:29:23.815659 kubelet[2027]: E0906 00:29:23.815575 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:23.822365 env[1201]: time="2025-09-06T00:29:23.822176798Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 00:29:23.821000 audit[2777]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:23.821000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd276ce890 a2=0 a3=7ffd276ce87c items=0 ppid=2136 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:23.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:23.826000 audit[2777]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:23.826000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd276ce890 a2=0 a3=7ffd276ce87c items=0 ppid=2136 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:23.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:23.832000 audit: BPF prog-id=138 op=UNLOAD Sep 6 00:29:23.829352 systemd[1]: cri-containerd-266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2.scope: Deactivated successfully. Sep 6 00:29:23.876881 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2-rootfs.mount: Deactivated successfully. Sep 6 00:29:23.892681 env[1201]: time="2025-09-06T00:29:23.892575255Z" level=info msg="shim disconnected" id=266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2 Sep 6 00:29:23.893077 env[1201]: time="2025-09-06T00:29:23.893042595Z" level=warning msg="cleaning up after shim disconnected" id=266211e42e42d77492f6003a03144e31808ebdfe43ae03d61f0f6ab6a12135f2 namespace=k8s.io Sep 6 00:29:23.893255 env[1201]: time="2025-09-06T00:29:23.893223200Z" level=info msg="cleaning up dead shim" Sep 6 00:29:23.909428 kubelet[2027]: I0906 00:29:23.906789 2027 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 00:29:23.925417 env[1201]: time="2025-09-06T00:29:23.924598143Z" level=warning msg="cleanup warnings time=\"2025-09-06T00:29:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2790 runtime=io.containerd.runc.v2\n" Sep 6 00:29:24.065871 systemd[1]: Created slice kubepods-burstable-podebb6ddae_38b0_4a28_8585_540bfa2e4cf4.slice. Sep 6 00:29:24.084570 systemd[1]: Created slice kubepods-besteffort-pod2b7f227d_4c16_4db2_a0c5_43bb1c516235.slice. Sep 6 00:29:24.090049 env[1201]: time="2025-09-06T00:29:24.089981652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 00:29:24.100702 systemd[1]: Created slice kubepods-besteffort-pod14c664da_0dcf_4e43_ad38_6dfc23481a33.slice. Sep 6 00:29:24.109125 kubelet[2027]: I0906 00:29:24.107845 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-backend-key-pair\") pod \"whisker-86f5b6cb8f-jvsl7\" (UID: \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\") " pod="calico-system/whisker-86f5b6cb8f-jvsl7" Sep 6 00:29:24.109125 kubelet[2027]: I0906 00:29:24.108014 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-ca-bundle\") pod \"whisker-86f5b6cb8f-jvsl7\" (UID: \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\") " pod="calico-system/whisker-86f5b6cb8f-jvsl7" Sep 6 00:29:24.109125 kubelet[2027]: I0906 00:29:24.108057 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qvpt2\" (UniqueName: \"kubernetes.io/projected/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-kube-api-access-qvpt2\") pod \"whisker-86f5b6cb8f-jvsl7\" (UID: \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\") " pod="calico-system/whisker-86f5b6cb8f-jvsl7" Sep 6 00:29:24.109125 kubelet[2027]: I0906 00:29:24.108126 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2b7f227d-4c16-4db2-a0c5-43bb1c516235-calico-apiserver-certs\") pod \"calico-apiserver-78f697856d-r5dpj\" (UID: \"2b7f227d-4c16-4db2-a0c5-43bb1c516235\") " pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" Sep 6 00:29:24.109125 kubelet[2027]: I0906 00:29:24.108179 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k8g65\" (UniqueName: \"kubernetes.io/projected/a76dcbff-37b9-4dc5-8732-1cbee8470613-kube-api-access-k8g65\") pod \"calico-kube-controllers-5d8dfc7c5-r7brn\" (UID: \"a76dcbff-37b9-4dc5-8732-1cbee8470613\") " pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" Sep 6 00:29:24.109662 kubelet[2027]: I0906 00:29:24.108234 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ad7d0935-9a1f-48ec-af2b-9a3b763c9e06-config-volume\") pod \"coredns-674b8bbfcf-d5w6h\" (UID: \"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06\") " pod="kube-system/coredns-674b8bbfcf-d5w6h" Sep 6 00:29:24.109662 kubelet[2027]: I0906 00:29:24.108270 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x9lb6\" (UniqueName: \"kubernetes.io/projected/2b7f227d-4c16-4db2-a0c5-43bb1c516235-kube-api-access-x9lb6\") pod \"calico-apiserver-78f697856d-r5dpj\" (UID: \"2b7f227d-4c16-4db2-a0c5-43bb1c516235\") " pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" Sep 6 00:29:24.109662 kubelet[2027]: I0906 00:29:24.108319 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tdns7\" (UniqueName: \"kubernetes.io/projected/14c664da-0dcf-4e43-ad38-6dfc23481a33-kube-api-access-tdns7\") pod \"calico-apiserver-78f697856d-s2f4g\" (UID: \"14c664da-0dcf-4e43-ad38-6dfc23481a33\") " pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" Sep 6 00:29:24.109662 kubelet[2027]: I0906 00:29:24.108362 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hp9dp\" (UniqueName: \"kubernetes.io/projected/ebb6ddae-38b0-4a28-8585-540bfa2e4cf4-kube-api-access-hp9dp\") pod \"coredns-674b8bbfcf-qp2t8\" (UID: \"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4\") " pod="kube-system/coredns-674b8bbfcf-qp2t8" Sep 6 00:29:24.109662 kubelet[2027]: I0906 00:29:24.108404 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/7d1f646d-5a60-49b2-83f9-87ae9cc20b46-config\") pod \"goldmane-54d579b49d-ffdth\" (UID: \"7d1f646d-5a60-49b2-83f9-87ae9cc20b46\") " pod="calico-system/goldmane-54d579b49d-ffdth" Sep 6 00:29:24.109975 kubelet[2027]: I0906 00:29:24.108446 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7d1f646d-5a60-49b2-83f9-87ae9cc20b46-goldmane-ca-bundle\") pod \"goldmane-54d579b49d-ffdth\" (UID: \"7d1f646d-5a60-49b2-83f9-87ae9cc20b46\") " pod="calico-system/goldmane-54d579b49d-ffdth" Sep 6 00:29:24.109975 kubelet[2027]: I0906 00:29:24.108486 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mjwbq\" (UniqueName: \"kubernetes.io/projected/7d1f646d-5a60-49b2-83f9-87ae9cc20b46-kube-api-access-mjwbq\") pod \"goldmane-54d579b49d-ffdth\" (UID: \"7d1f646d-5a60-49b2-83f9-87ae9cc20b46\") " pod="calico-system/goldmane-54d579b49d-ffdth" Sep 6 00:29:24.109975 kubelet[2027]: I0906 00:29:24.108525 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ebb6ddae-38b0-4a28-8585-540bfa2e4cf4-config-volume\") pod \"coredns-674b8bbfcf-qp2t8\" (UID: \"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4\") " pod="kube-system/coredns-674b8bbfcf-qp2t8" Sep 6 00:29:24.109975 kubelet[2027]: I0906 00:29:24.108615 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/14c664da-0dcf-4e43-ad38-6dfc23481a33-calico-apiserver-certs\") pod \"calico-apiserver-78f697856d-s2f4g\" (UID: \"14c664da-0dcf-4e43-ad38-6dfc23481a33\") " pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" Sep 6 00:29:24.109975 kubelet[2027]: I0906 00:29:24.108670 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a76dcbff-37b9-4dc5-8732-1cbee8470613-tigera-ca-bundle\") pod \"calico-kube-controllers-5d8dfc7c5-r7brn\" (UID: \"a76dcbff-37b9-4dc5-8732-1cbee8470613\") " pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" Sep 6 00:29:24.110418 kubelet[2027]: I0906 00:29:24.108702 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/7d1f646d-5a60-49b2-83f9-87ae9cc20b46-goldmane-key-pair\") pod \"goldmane-54d579b49d-ffdth\" (UID: \"7d1f646d-5a60-49b2-83f9-87ae9cc20b46\") " pod="calico-system/goldmane-54d579b49d-ffdth" Sep 6 00:29:24.110418 kubelet[2027]: I0906 00:29:24.108743 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vzmk7\" (UniqueName: \"kubernetes.io/projected/ad7d0935-9a1f-48ec-af2b-9a3b763c9e06-kube-api-access-vzmk7\") pod \"coredns-674b8bbfcf-d5w6h\" (UID: \"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06\") " pod="kube-system/coredns-674b8bbfcf-d5w6h" Sep 6 00:29:24.117493 systemd[1]: Created slice kubepods-besteffort-pod7d1f646d_5a60_49b2_83f9_87ae9cc20b46.slice. Sep 6 00:29:24.132992 systemd[1]: Created slice kubepods-burstable-podad7d0935_9a1f_48ec_af2b_9a3b763c9e06.slice. Sep 6 00:29:24.142062 systemd[1]: Created slice kubepods-besteffort-poda76dcbff_37b9_4dc5_8732_1cbee8470613.slice. Sep 6 00:29:24.158828 systemd[1]: Created slice kubepods-besteffort-podb9c5fe4a_f9f3_45c7_a5d6_a53c9aa9ecc7.slice. Sep 6 00:29:24.389597 env[1201]: time="2025-09-06T00:29:24.388572069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qp2t8,Uid:ebb6ddae-38b0-4a28-8585-540bfa2e4cf4,Namespace:kube-system,Attempt:0,}" Sep 6 00:29:24.395813 env[1201]: time="2025-09-06T00:29:24.395732044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-r5dpj,Uid:2b7f227d-4c16-4db2-a0c5-43bb1c516235,Namespace:calico-apiserver,Attempt:0,}" Sep 6 00:29:24.405216 env[1201]: time="2025-09-06T00:29:24.405129984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-s2f4g,Uid:14c664da-0dcf-4e43-ad38-6dfc23481a33,Namespace:calico-apiserver,Attempt:0,}" Sep 6 00:29:24.429069 env[1201]: time="2025-09-06T00:29:24.429006187Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-ffdth,Uid:7d1f646d-5a60-49b2-83f9-87ae9cc20b46,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:24.443855 env[1201]: time="2025-09-06T00:29:24.443786633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-d5w6h,Uid:ad7d0935-9a1f-48ec-af2b-9a3b763c9e06,Namespace:kube-system,Attempt:0,}" Sep 6 00:29:24.454783 env[1201]: time="2025-09-06T00:29:24.454716194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d8dfc7c5-r7brn,Uid:a76dcbff-37b9-4dc5-8732-1cbee8470613,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:24.466010 env[1201]: time="2025-09-06T00:29:24.465864891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-86f5b6cb8f-jvsl7,Uid:b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:24.967055 env[1201]: time="2025-09-06T00:29:24.966930648Z" level=error msg="Failed to destroy network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:24.976681 env[1201]: time="2025-09-06T00:29:24.967563885Z" level=error msg="encountered an error cleaning up failed sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:24.976681 env[1201]: time="2025-09-06T00:29:24.967643095Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d8dfc7c5-r7brn,Uid:a76dcbff-37b9-4dc5-8732-1cbee8470613,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:24.971035 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee-shm.mount: Deactivated successfully. Sep 6 00:29:24.990766 kubelet[2027]: E0906 00:29:24.990396 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:24.993564 kubelet[2027]: E0906 00:29:24.993118 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" Sep 6 00:29:24.993564 kubelet[2027]: E0906 00:29:24.993227 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" Sep 6 00:29:24.993564 kubelet[2027]: E0906 00:29:24.993443 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5d8dfc7c5-r7brn_calico-system(a76dcbff-37b9-4dc5-8732-1cbee8470613)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5d8dfc7c5-r7brn_calico-system(a76dcbff-37b9-4dc5-8732-1cbee8470613)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" podUID="a76dcbff-37b9-4dc5-8732-1cbee8470613" Sep 6 00:29:25.037595 env[1201]: time="2025-09-06T00:29:25.037492294Z" level=error msg="Failed to destroy network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.044094 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e-shm.mount: Deactivated successfully. Sep 6 00:29:25.047053 env[1201]: time="2025-09-06T00:29:25.046972359Z" level=error msg="encountered an error cleaning up failed sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.067755 env[1201]: time="2025-09-06T00:29:25.048198085Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-s2f4g,Uid:14c664da-0dcf-4e43-ad38-6dfc23481a33,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.067755 env[1201]: time="2025-09-06T00:29:25.047884873Z" level=error msg="Failed to destroy network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.067755 env[1201]: time="2025-09-06T00:29:25.059012046Z" level=error msg="encountered an error cleaning up failed sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.067755 env[1201]: time="2025-09-06T00:29:25.059145269Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qp2t8,Uid:ebb6ddae-38b0-4a28-8585-540bfa2e4cf4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.068262 kubelet[2027]: E0906 00:29:25.056926 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.068262 kubelet[2027]: E0906 00:29:25.057047 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" Sep 6 00:29:25.068262 kubelet[2027]: E0906 00:29:25.057098 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" Sep 6 00:29:25.055133 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135-shm.mount: Deactivated successfully. Sep 6 00:29:25.068947 kubelet[2027]: E0906 00:29:25.057197 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-78f697856d-s2f4g_calico-apiserver(14c664da-0dcf-4e43-ad38-6dfc23481a33)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-78f697856d-s2f4g_calico-apiserver(14c664da-0dcf-4e43-ad38-6dfc23481a33)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" podUID="14c664da-0dcf-4e43-ad38-6dfc23481a33" Sep 6 00:29:25.068947 kubelet[2027]: E0906 00:29:25.059867 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.068947 kubelet[2027]: E0906 00:29:25.059950 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-qp2t8" Sep 6 00:29:25.069342 kubelet[2027]: E0906 00:29:25.059994 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-qp2t8" Sep 6 00:29:25.069342 kubelet[2027]: E0906 00:29:25.060124 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-qp2t8_kube-system(ebb6ddae-38b0-4a28-8585-540bfa2e4cf4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-qp2t8_kube-system(ebb6ddae-38b0-4a28-8585-540bfa2e4cf4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-qp2t8" podUID="ebb6ddae-38b0-4a28-8585-540bfa2e4cf4" Sep 6 00:29:25.087324 kubelet[2027]: I0906 00:29:25.087274 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:25.093382 kubelet[2027]: I0906 00:29:25.093320 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:25.107055 env[1201]: time="2025-09-06T00:29:25.106972123Z" level=error msg="Failed to destroy network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.115132 env[1201]: time="2025-09-06T00:29:25.110497107Z" level=error msg="encountered an error cleaning up failed sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.115132 env[1201]: time="2025-09-06T00:29:25.110608547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-r5dpj,Uid:2b7f227d-4c16-4db2-a0c5-43bb1c516235,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.115132 env[1201]: time="2025-09-06T00:29:25.111058562Z" level=error msg="Failed to destroy network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.115132 env[1201]: time="2025-09-06T00:29:25.111486100Z" level=error msg="encountered an error cleaning up failed sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.115132 env[1201]: time="2025-09-06T00:29:25.111567971Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-ffdth,Uid:7d1f646d-5a60-49b2-83f9-87ae9cc20b46,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.113165 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1-shm.mount: Deactivated successfully. Sep 6 00:29:25.129909 kubelet[2027]: E0906 00:29:25.129827 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.130141 kubelet[2027]: E0906 00:29:25.129937 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-ffdth" Sep 6 00:29:25.130615 kubelet[2027]: E0906 00:29:25.130565 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-ffdth" Sep 6 00:29:25.130724 kubelet[2027]: E0906 00:29:25.130656 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-54d579b49d-ffdth_calico-system(7d1f646d-5a60-49b2-83f9-87ae9cc20b46)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-54d579b49d-ffdth_calico-system(7d1f646d-5a60-49b2-83f9-87ae9cc20b46)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-ffdth" podUID="7d1f646d-5a60-49b2-83f9-87ae9cc20b46" Sep 6 00:29:25.130866 kubelet[2027]: E0906 00:29:25.130738 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.130866 kubelet[2027]: E0906 00:29:25.130796 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" Sep 6 00:29:25.130866 kubelet[2027]: E0906 00:29:25.130819 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" Sep 6 00:29:25.131111 kubelet[2027]: E0906 00:29:25.130881 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-78f697856d-r5dpj_calico-apiserver(2b7f227d-4c16-4db2-a0c5-43bb1c516235)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-78f697856d-r5dpj_calico-apiserver(2b7f227d-4c16-4db2-a0c5-43bb1c516235)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" podUID="2b7f227d-4c16-4db2-a0c5-43bb1c516235" Sep 6 00:29:25.140657 kubelet[2027]: I0906 00:29:25.140319 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:25.171234 env[1201]: time="2025-09-06T00:29:25.171175981Z" level=info msg="StopPodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\"" Sep 6 00:29:25.174288 env[1201]: time="2025-09-06T00:29:25.174229287Z" level=info msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" Sep 6 00:29:25.175814 env[1201]: time="2025-09-06T00:29:25.174954606Z" level=info msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" Sep 6 00:29:25.187033 env[1201]: time="2025-09-06T00:29:25.186950905Z" level=error msg="Failed to destroy network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.187828 env[1201]: time="2025-09-06T00:29:25.187782674Z" level=error msg="encountered an error cleaning up failed sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.188047 env[1201]: time="2025-09-06T00:29:25.187989959Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-d5w6h,Uid:ad7d0935-9a1f-48ec-af2b-9a3b763c9e06,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.188833 kubelet[2027]: E0906 00:29:25.188477 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.188833 kubelet[2027]: E0906 00:29:25.188595 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-d5w6h" Sep 6 00:29:25.188833 kubelet[2027]: E0906 00:29:25.188645 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-d5w6h" Sep 6 00:29:25.189114 kubelet[2027]: E0906 00:29:25.188748 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-d5w6h_kube-system(ad7d0935-9a1f-48ec-af2b-9a3b763c9e06)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-d5w6h_kube-system(ad7d0935-9a1f-48ec-af2b-9a3b763c9e06)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-d5w6h" podUID="ad7d0935-9a1f-48ec-af2b-9a3b763c9e06" Sep 6 00:29:25.200972 env[1201]: time="2025-09-06T00:29:25.200876071Z" level=error msg="Failed to destroy network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.201495 env[1201]: time="2025-09-06T00:29:25.201437650Z" level=error msg="encountered an error cleaning up failed sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.201611 env[1201]: time="2025-09-06T00:29:25.201550629Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-86f5b6cb8f-jvsl7,Uid:b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.201867 kubelet[2027]: E0906 00:29:25.201812 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.201986 kubelet[2027]: E0906 00:29:25.201894 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-86f5b6cb8f-jvsl7" Sep 6 00:29:25.201986 kubelet[2027]: E0906 00:29:25.201931 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-86f5b6cb8f-jvsl7" Sep 6 00:29:25.202116 kubelet[2027]: E0906 00:29:25.202038 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-86f5b6cb8f-jvsl7_calico-system(b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-86f5b6cb8f-jvsl7_calico-system(b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-86f5b6cb8f-jvsl7" podUID="b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" Sep 6 00:29:25.285719 env[1201]: time="2025-09-06T00:29:25.285645673Z" level=error msg="StopPodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" failed" error="failed to destroy network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.286307 kubelet[2027]: E0906 00:29:25.286233 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:25.286526 kubelet[2027]: E0906 00:29:25.286348 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135"} Sep 6 00:29:25.286603 kubelet[2027]: E0906 00:29:25.286541 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:25.286603 kubelet[2027]: E0906 00:29:25.286587 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-qp2t8" podUID="ebb6ddae-38b0-4a28-8585-540bfa2e4cf4" Sep 6 00:29:25.297863 env[1201]: time="2025-09-06T00:29:25.297774025Z" level=error msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" failed" error="failed to destroy network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.298710 kubelet[2027]: E0906 00:29:25.298341 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:25.298710 kubelet[2027]: E0906 00:29:25.298423 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee"} Sep 6 00:29:25.298710 kubelet[2027]: E0906 00:29:25.298477 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a76dcbff-37b9-4dc5-8732-1cbee8470613\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:25.305486 kubelet[2027]: E0906 00:29:25.298904 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a76dcbff-37b9-4dc5-8732-1cbee8470613\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" podUID="a76dcbff-37b9-4dc5-8732-1cbee8470613" Sep 6 00:29:25.310654 env[1201]: time="2025-09-06T00:29:25.310571143Z" level=error msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" failed" error="failed to destroy network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:25.311764 kubelet[2027]: E0906 00:29:25.311344 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:25.311764 kubelet[2027]: E0906 00:29:25.311488 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e"} Sep 6 00:29:25.311764 kubelet[2027]: E0906 00:29:25.311573 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14c664da-0dcf-4e43-ad38-6dfc23481a33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:25.311764 kubelet[2027]: E0906 00:29:25.311643 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14c664da-0dcf-4e43-ad38-6dfc23481a33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" podUID="14c664da-0dcf-4e43-ad38-6dfc23481a33" Sep 6 00:29:25.825520 systemd[1]: Created slice kubepods-besteffort-pod1debf633_9211_4db0_9299_eca2c0eba673.slice. Sep 6 00:29:25.833958 env[1201]: time="2025-09-06T00:29:25.833896149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttshf,Uid:1debf633-9211-4db0-9299-eca2c0eba673,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:25.878654 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69-shm.mount: Deactivated successfully. Sep 6 00:29:25.878795 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f-shm.mount: Deactivated successfully. Sep 6 00:29:25.878931 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21-shm.mount: Deactivated successfully. Sep 6 00:29:26.014908 env[1201]: time="2025-09-06T00:29:26.014813241Z" level=error msg="Failed to destroy network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.018926 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8-shm.mount: Deactivated successfully. Sep 6 00:29:26.019819 env[1201]: time="2025-09-06T00:29:26.019748222Z" level=error msg="encountered an error cleaning up failed sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.020302 env[1201]: time="2025-09-06T00:29:26.019985355Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttshf,Uid:1debf633-9211-4db0-9299-eca2c0eba673,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.021434 kubelet[2027]: E0906 00:29:26.021019 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.021434 kubelet[2027]: E0906 00:29:26.021181 2027 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:26.021434 kubelet[2027]: E0906 00:29:26.021240 2027 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ttshf" Sep 6 00:29:26.024331 kubelet[2027]: E0906 00:29:26.021348 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ttshf_calico-system(1debf633-9211-4db0-9299-eca2c0eba673)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ttshf_calico-system(1debf633-9211-4db0-9299-eca2c0eba673)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:26.164998 kubelet[2027]: I0906 00:29:26.162484 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:26.167196 env[1201]: time="2025-09-06T00:29:26.167134175Z" level=info msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" Sep 6 00:29:26.170386 kubelet[2027]: I0906 00:29:26.170311 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:26.174291 env[1201]: time="2025-09-06T00:29:26.174182733Z" level=info msg="StopPodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\"" Sep 6 00:29:26.186996 kubelet[2027]: I0906 00:29:26.186935 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:26.190405 env[1201]: time="2025-09-06T00:29:26.190341319Z" level=info msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" Sep 6 00:29:26.193645 kubelet[2027]: I0906 00:29:26.193605 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:26.194410 env[1201]: time="2025-09-06T00:29:26.194368220Z" level=info msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" Sep 6 00:29:26.209964 kubelet[2027]: I0906 00:29:26.209909 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:26.215541 env[1201]: time="2025-09-06T00:29:26.215447534Z" level=info msg="StopPodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\"" Sep 6 00:29:26.353120 env[1201]: time="2025-09-06T00:29:26.353005155Z" level=error msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" failed" error="failed to destroy network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.353819 kubelet[2027]: E0906 00:29:26.353430 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:26.353819 kubelet[2027]: E0906 00:29:26.353559 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69"} Sep 6 00:29:26.353819 kubelet[2027]: E0906 00:29:26.353619 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:26.353819 kubelet[2027]: E0906 00:29:26.353666 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-d5w6h" podUID="ad7d0935-9a1f-48ec-af2b-9a3b763c9e06" Sep 6 00:29:26.380507 env[1201]: time="2025-09-06T00:29:26.380395332Z" level=error msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" failed" error="failed to destroy network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.381204 kubelet[2027]: E0906 00:29:26.381113 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:26.381483 kubelet[2027]: E0906 00:29:26.381216 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8"} Sep 6 00:29:26.381483 kubelet[2027]: E0906 00:29:26.381267 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1debf633-9211-4db0-9299-eca2c0eba673\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:26.381483 kubelet[2027]: E0906 00:29:26.381302 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1debf633-9211-4db0-9299-eca2c0eba673\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:26.391206 env[1201]: time="2025-09-06T00:29:26.391060695Z" level=error msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" failed" error="failed to destroy network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.391778 kubelet[2027]: E0906 00:29:26.391714 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:26.391938 kubelet[2027]: E0906 00:29:26.391797 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f"} Sep 6 00:29:26.391938 kubelet[2027]: E0906 00:29:26.391860 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:26.391938 kubelet[2027]: E0906 00:29:26.391914 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-86f5b6cb8f-jvsl7" podUID="b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" Sep 6 00:29:26.412631 env[1201]: time="2025-09-06T00:29:26.411774648Z" level=error msg="StopPodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" failed" error="failed to destroy network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.412859 kubelet[2027]: E0906 00:29:26.412356 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:26.415213 kubelet[2027]: E0906 00:29:26.413452 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21"} Sep 6 00:29:26.415213 kubelet[2027]: E0906 00:29:26.413520 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7d1f646d-5a60-49b2-83f9-87ae9cc20b46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:26.415213 kubelet[2027]: E0906 00:29:26.413615 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7d1f646d-5a60-49b2-83f9-87ae9cc20b46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-ffdth" podUID="7d1f646d-5a60-49b2-83f9-87ae9cc20b46" Sep 6 00:29:26.451365 env[1201]: time="2025-09-06T00:29:26.451281880Z" level=error msg="StopPodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" failed" error="failed to destroy network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:26.452016 kubelet[2027]: E0906 00:29:26.451951 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:26.452153 kubelet[2027]: E0906 00:29:26.452038 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1"} Sep 6 00:29:26.452153 kubelet[2027]: E0906 00:29:26.452134 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2b7f227d-4c16-4db2-a0c5-43bb1c516235\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:26.452322 kubelet[2027]: E0906 00:29:26.452174 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2b7f227d-4c16-4db2-a0c5-43bb1c516235\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" podUID="2b7f227d-4c16-4db2-a0c5-43bb1c516235" Sep 6 00:29:36.822705 env[1201]: time="2025-09-06T00:29:36.822193379Z" level=info msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" Sep 6 00:29:36.841147 env[1201]: time="2025-09-06T00:29:36.841051487Z" level=info msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" Sep 6 00:29:36.963103 env[1201]: time="2025-09-06T00:29:36.962972247Z" level=error msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" failed" error="failed to destroy network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:36.964476 kubelet[2027]: E0906 00:29:36.963439 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:36.964476 kubelet[2027]: E0906 00:29:36.963651 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee"} Sep 6 00:29:36.964476 kubelet[2027]: E0906 00:29:36.963756 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a76dcbff-37b9-4dc5-8732-1cbee8470613\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:36.964476 kubelet[2027]: E0906 00:29:36.963835 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a76dcbff-37b9-4dc5-8732-1cbee8470613\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" podUID="a76dcbff-37b9-4dc5-8732-1cbee8470613" Sep 6 00:29:36.967613 env[1201]: time="2025-09-06T00:29:36.967528773Z" level=error msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" failed" error="failed to destroy network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:36.968220 kubelet[2027]: E0906 00:29:36.967907 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:36.968220 kubelet[2027]: E0906 00:29:36.967985 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e"} Sep 6 00:29:36.968220 kubelet[2027]: E0906 00:29:36.968053 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14c664da-0dcf-4e43-ad38-6dfc23481a33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:36.968220 kubelet[2027]: E0906 00:29:36.968140 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14c664da-0dcf-4e43-ad38-6dfc23481a33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" podUID="14c664da-0dcf-4e43-ad38-6dfc23481a33" Sep 6 00:29:37.817473 env[1201]: time="2025-09-06T00:29:37.817358430Z" level=info msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" Sep 6 00:29:37.823847 env[1201]: time="2025-09-06T00:29:37.823784649Z" level=info msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" Sep 6 00:29:37.973903 env[1201]: time="2025-09-06T00:29:37.973819357Z" level=error msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" failed" error="failed to destroy network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:37.975377 kubelet[2027]: E0906 00:29:37.975285 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:37.976050 kubelet[2027]: E0906 00:29:37.975433 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f"} Sep 6 00:29:37.976050 kubelet[2027]: E0906 00:29:37.975502 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:37.976050 kubelet[2027]: E0906 00:29:37.975579 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-86f5b6cb8f-jvsl7" podUID="b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" Sep 6 00:29:38.029408 env[1201]: time="2025-09-06T00:29:38.029258618Z" level=error msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" failed" error="failed to destroy network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:38.032377 kubelet[2027]: E0906 00:29:38.032000 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:38.032377 kubelet[2027]: E0906 00:29:38.032117 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8"} Sep 6 00:29:38.032377 kubelet[2027]: E0906 00:29:38.032185 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1debf633-9211-4db0-9299-eca2c0eba673\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:38.032377 kubelet[2027]: E0906 00:29:38.032229 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1debf633-9211-4db0-9299-eca2c0eba673\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ttshf" podUID="1debf633-9211-4db0-9299-eca2c0eba673" Sep 6 00:29:38.084906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1734598774.mount: Deactivated successfully. Sep 6 00:29:38.142615 env[1201]: time="2025-09-06T00:29:38.142513205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:38.147937 env[1201]: time="2025-09-06T00:29:38.147866660Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:38.151700 env[1201]: time="2025-09-06T00:29:38.151623449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:38.156416 env[1201]: time="2025-09-06T00:29:38.156304977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:38.163634 env[1201]: time="2025-09-06T00:29:38.157401088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 00:29:38.224519 env[1201]: time="2025-09-06T00:29:38.223487404Z" level=info msg="CreateContainer within sandbox \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 00:29:38.253761 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1028035912.mount: Deactivated successfully. Sep 6 00:29:38.260789 env[1201]: time="2025-09-06T00:29:38.260691607Z" level=info msg="CreateContainer within sandbox \"7f3ead2260a44d069326f1e0e23bc9e41dbf52319d8dc15ec31059b633a60751\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81\"" Sep 6 00:29:38.262046 env[1201]: time="2025-09-06T00:29:38.261821699Z" level=info msg="StartContainer for \"656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81\"" Sep 6 00:29:38.310455 systemd[1]: Started cri-containerd-656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81.scope. Sep 6 00:29:38.390000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.422868 kernel: kauditd_printk_skb: 40 callbacks suppressed Sep 6 00:29:38.423073 kernel: audit: type=1400 audit(1757118578.390:1004): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.425110 kernel: audit: type=1300 audit(1757118578.390:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4dad7968f8 items=0 ppid=2541 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:38.425189 kernel: audit: type=1327 audit(1757118578.390:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366261363534626437336532316334363164376362656639663336 Sep 6 00:29:38.390000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4dad7968f8 items=0 ppid=2541 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:38.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366261363534626437336532316334363164376362656639663336 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.454726 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.457420 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.457497 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.457542 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.467145 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.478413 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.478613 kernel: audit: type=1400 audit(1757118578.391:1005): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.391000 audit: BPF prog-id=139 op=LOAD Sep 6 00:29:38.391000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d03c8 items=0 ppid=2541 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:38.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366261363534626437336532316334363164376362656639663336 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.398000 audit: BPF prog-id=140 op=LOAD Sep 6 00:29:38.398000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003d0418 items=0 ppid=2541 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:38.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366261363534626437336532316334363164376362656639663336 Sep 6 00:29:38.406000 audit: BPF prog-id=140 op=UNLOAD Sep 6 00:29:38.406000 audit: BPF prog-id=139 op=UNLOAD Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:38.406000 audit: BPF prog-id=141 op=LOAD Sep 6 00:29:38.406000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003d04a8 items=0 ppid=2541 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:38.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366261363534626437336532316334363164376362656639663336 Sep 6 00:29:38.493409 env[1201]: time="2025-09-06T00:29:38.493305931Z" level=info msg="StartContainer for \"656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81\" returns successfully" Sep 6 00:29:38.819523 env[1201]: time="2025-09-06T00:29:38.819462889Z" level=info msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" Sep 6 00:29:38.895769 env[1201]: time="2025-09-06T00:29:38.895680355Z" level=error msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" failed" error="failed to destroy network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 00:29:38.896968 kubelet[2027]: E0906 00:29:38.896882 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:38.897151 kubelet[2027]: E0906 00:29:38.896990 2027 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69"} Sep 6 00:29:38.897151 kubelet[2027]: E0906 00:29:38.897067 2027 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 00:29:38.897430 kubelet[2027]: E0906 00:29:38.897158 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-d5w6h" podUID="ad7d0935-9a1f-48ec-af2b-9a3b763c9e06" Sep 6 00:29:39.015059 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 00:29:39.015747 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 00:29:39.376327 systemd[1]: run-containerd-runc-k8s.io-656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81-runc.onebXq.mount: Deactivated successfully. Sep 6 00:29:39.501798 env[1201]: time="2025-09-06T00:29:39.501706891Z" level=info msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" Sep 6 00:29:39.784000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.784000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c013420b40 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:29:39.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:29:39.784000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.784000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0135bce40 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:29:39.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:29:39.801000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.801000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0134bfc20 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:29:39.802873 kubelet[2027]: I0906 00:29:39.799725 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-sr4bx" podStartSLOduration=2.911671732 podStartE2EDuration="32.799652827s" podCreationTimestamp="2025-09-06 00:29:07 +0000 UTC" firstStartedPulling="2025-09-06 00:29:08.276964373 +0000 UTC m=+23.776911106" lastFinishedPulling="2025-09-06 00:29:38.164945456 +0000 UTC m=+53.664892201" observedRunningTime="2025-09-06 00:29:39.552990542 +0000 UTC m=+55.052937290" watchObservedRunningTime="2025-09-06 00:29:39.799652827 +0000 UTC m=+55.299599570" Sep 6 00:29:39.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:29:39.817426 env[1201]: time="2025-09-06T00:29:39.817361119Z" level=info msg="StopPodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\"" Sep 6 00:29:39.827000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.827000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00f83a000 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:29:39.827000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:29:39.892000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.892000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f2087a0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:29:39.892000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:29:39.892000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.892000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fce6b70 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:29:39.892000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:29:39.928000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.928000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001157cc0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:29:39.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:29:39.939000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:39.939000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029b3950 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:29:39.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:39.796 [INFO][3321] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:39.797 [INFO][3321] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" iface="eth0" netns="/var/run/netns/cni-cad80023-bfe1-6dd2-72d2-98ecbc7e5a05" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:39.799 [INFO][3321] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" iface="eth0" netns="/var/run/netns/cni-cad80023-bfe1-6dd2-72d2-98ecbc7e5a05" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:39.801 [INFO][3321] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" iface="eth0" netns="/var/run/netns/cni-cad80023-bfe1-6dd2-72d2-98ecbc7e5a05" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:39.801 [INFO][3321] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:39.801 [INFO][3321] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.280 [INFO][3328] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.284 [INFO][3328] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.285 [INFO][3328] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.300 [WARNING][3328] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.300 [INFO][3328] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.316 [INFO][3328] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:40.326408 env[1201]: 2025-09-06 00:29:40.320 [INFO][3321] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:40.332082 systemd[1]: run-netns-cni\x2dcad80023\x2dbfe1\x2d6dd2\x2d72d2\x2d98ecbc7e5a05.mount: Deactivated successfully. Sep 6 00:29:40.334279 env[1201]: time="2025-09-06T00:29:40.334172461Z" level=info msg="TearDown network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" successfully" Sep 6 00:29:40.334465 env[1201]: time="2025-09-06T00:29:40.334429297Z" level=info msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" returns successfully" Sep 6 00:29:40.372759 systemd[1]: run-containerd-runc-k8s.io-656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81-runc.VXtedO.mount: Deactivated successfully. Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:39.983 [INFO][3338] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:39.984 [INFO][3338] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" iface="eth0" netns="/var/run/netns/cni-0c4ff3d8-c874-187d-bd97-4dd1cc1fb144" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:39.984 [INFO][3338] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" iface="eth0" netns="/var/run/netns/cni-0c4ff3d8-c874-187d-bd97-4dd1cc1fb144" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:39.985 [INFO][3338] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" iface="eth0" netns="/var/run/netns/cni-0c4ff3d8-c874-187d-bd97-4dd1cc1fb144" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:39.985 [INFO][3338] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:39.985 [INFO][3338] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.281 [INFO][3348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.284 [INFO][3348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.316 [INFO][3348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.339 [WARNING][3348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.340 [INFO][3348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.346 [INFO][3348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:40.381423 env[1201]: 2025-09-06 00:29:40.378 [INFO][3338] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:40.386945 env[1201]: time="2025-09-06T00:29:40.386731479Z" level=info msg="TearDown network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" successfully" Sep 6 00:29:40.386945 env[1201]: time="2025-09-06T00:29:40.386804153Z" level=info msg="StopPodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" returns successfully" Sep 6 00:29:40.384650 systemd[1]: run-netns-cni\x2d0c4ff3d8\x2dc874\x2d187d\x2dbd97\x2d4dd1cc1fb144.mount: Deactivated successfully. Sep 6 00:29:40.389421 env[1201]: time="2025-09-06T00:29:40.389216294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qp2t8,Uid:ebb6ddae-38b0-4a28-8585-540bfa2e4cf4,Namespace:kube-system,Attempt:1,}" Sep 6 00:29:40.514340 kubelet[2027]: I0906 00:29:40.514276 2027 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-qvpt2\" (UniqueName: \"kubernetes.io/projected/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-kube-api-access-qvpt2\") pod \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" (UID: \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\") " Sep 6 00:29:40.514914 kubelet[2027]: I0906 00:29:40.514884 2027 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-backend-key-pair\") pod \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" (UID: \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\") " Sep 6 00:29:40.515121 kubelet[2027]: I0906 00:29:40.515079 2027 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-ca-bundle\") pod \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\" (UID: \"b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7\") " Sep 6 00:29:40.544141 kubelet[2027]: I0906 00:29:40.542694 2027 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" (UID: "b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Sep 6 00:29:40.545061 kubelet[2027]: I0906 00:29:40.545024 2027 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" (UID: "b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 6 00:29:40.546794 kubelet[2027]: I0906 00:29:40.543045 2027 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-kube-api-access-qvpt2" (OuterVolumeSpecName: "kube-api-access-qvpt2") pod "b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" (UID: "b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7"). InnerVolumeSpecName "kube-api-access-qvpt2". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 6 00:29:40.618291 kubelet[2027]: I0906 00:29:40.617345 2027 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-ca-bundle\") on node \"srv-vva2b.gb1.brightbox.com\" DevicePath \"\"" Sep 6 00:29:40.618291 kubelet[2027]: I0906 00:29:40.617393 2027 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-qvpt2\" (UniqueName: \"kubernetes.io/projected/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-kube-api-access-qvpt2\") on node \"srv-vva2b.gb1.brightbox.com\" DevicePath \"\"" Sep 6 00:29:40.618291 kubelet[2027]: I0906 00:29:40.617412 2027 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7-whisker-backend-key-pair\") on node \"srv-vva2b.gb1.brightbox.com\" DevicePath \"\"" Sep 6 00:29:40.739553 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:29:40.739797 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali209146bdc1d: link becomes ready Sep 6 00:29:40.739967 systemd-networkd[1025]: cali209146bdc1d: Link UP Sep 6 00:29:40.740550 systemd-networkd[1025]: cali209146bdc1d: Gained carrier Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.490 [INFO][3384] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.548 [INFO][3384] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0 coredns-674b8bbfcf- kube-system ebb6ddae-38b0-4a28-8585-540bfa2e4cf4 918 0 2025-09-06 00:28:49 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com coredns-674b8bbfcf-qp2t8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali209146bdc1d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.548 [INFO][3384] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.609 [INFO][3403] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" HandleID="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.610 [INFO][3403] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" HandleID="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d7660), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-vva2b.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-qp2t8", "timestamp":"2025-09-06 00:29:40.609741337 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.610 [INFO][3403] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.610 [INFO][3403] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.610 [INFO][3403] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.630 [INFO][3403] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.657 [INFO][3403] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.667 [INFO][3403] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.671 [INFO][3403] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.675 [INFO][3403] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.675 [INFO][3403] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.679 [INFO][3403] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4 Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.688 [INFO][3403] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.702 [INFO][3403] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.1/26] block=192.168.76.0/26 handle="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.702 [INFO][3403] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.1/26] handle="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.702 [INFO][3403] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:40.780965 env[1201]: 2025-09-06 00:29:40.702 [INFO][3403] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.1/26] IPv6=[] ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" HandleID="k8s-pod-network.b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.784654 env[1201]: 2025-09-06 00:29:40.705 [INFO][3384] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-qp2t8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali209146bdc1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:40.784654 env[1201]: 2025-09-06 00:29:40.706 [INFO][3384] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.1/32] ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.784654 env[1201]: 2025-09-06 00:29:40.706 [INFO][3384] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali209146bdc1d ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.784654 env[1201]: 2025-09-06 00:29:40.741 [INFO][3384] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.784654 env[1201]: 2025-09-06 00:29:40.742 [INFO][3384] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4", Pod:"coredns-674b8bbfcf-qp2t8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali209146bdc1d", MAC:"d6:bb:fe:42:cd:31", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:40.784654 env[1201]: 2025-09-06 00:29:40.778 [INFO][3384] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4" Namespace="kube-system" Pod="coredns-674b8bbfcf-qp2t8" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:40.829791 env[1201]: time="2025-09-06T00:29:40.829619353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:40.830376 env[1201]: time="2025-09-06T00:29:40.830006141Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:40.830376 env[1201]: time="2025-09-06T00:29:40.830105488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:40.830986 env[1201]: time="2025-09-06T00:29:40.830918667Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4 pid=3423 runtime=io.containerd.runc.v2 Sep 6 00:29:40.847342 systemd[1]: Removed slice kubepods-besteffort-podb9c5fe4a_f9f3_45c7_a5d6_a53c9aa9ecc7.slice. Sep 6 00:29:40.856163 systemd[1]: Started cri-containerd-b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4.scope. Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.888000 audit: BPF prog-id=142 op=LOAD Sep 6 00:29:40.891000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.891000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3423 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:40.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656236383264663762666634646263386136386565643865333232 Sep 6 00:29:40.893000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.893000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3423 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:40.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656236383264663762666634646263386136386565643865333232 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.894000 audit: BPF prog-id=143 op=LOAD Sep 6 00:29:40.894000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000207180 items=0 ppid=3423 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:40.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656236383264663762666634646263386136386565643865333232 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.899000 audit: BPF prog-id=144 op=LOAD Sep 6 00:29:40.899000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002071c8 items=0 ppid=3423 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:40.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656236383264663762666634646263386136386565643865333232 Sep 6 00:29:40.907000 audit: BPF prog-id=144 op=UNLOAD Sep 6 00:29:40.907000 audit: BPF prog-id=143 op=UNLOAD Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:40.908000 audit: BPF prog-id=145 op=LOAD Sep 6 00:29:40.908000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002075d8 items=0 ppid=3423 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:40.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231656236383264663762666634646263386136386565643865333232 Sep 6 00:29:40.960617 env[1201]: time="2025-09-06T00:29:40.960518250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qp2t8,Uid:ebb6ddae-38b0-4a28-8585-540bfa2e4cf4,Namespace:kube-system,Attempt:1,} returns sandbox id \"b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4\"" Sep 6 00:29:40.977644 env[1201]: time="2025-09-06T00:29:40.977582235Z" level=info msg="CreateContainer within sandbox \"b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 6 00:29:41.006150 env[1201]: time="2025-09-06T00:29:41.006046621Z" level=info msg="CreateContainer within sandbox \"b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3fe7935f9786045acb75ab71248077f698b429ea72b5f3f6a5279b0dbe180ee8\"" Sep 6 00:29:41.007534 env[1201]: time="2025-09-06T00:29:41.007489529Z" level=info msg="StartContainer for \"3fe7935f9786045acb75ab71248077f698b429ea72b5f3f6a5279b0dbe180ee8\"" Sep 6 00:29:41.044511 systemd[1]: Started cri-containerd-3fe7935f9786045acb75ab71248077f698b429ea72b5f3f6a5279b0dbe180ee8.scope. Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.072000 audit: BPF prog-id=146 op=LOAD Sep 6 00:29:41.073000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.073000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3423 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653739333566393738363034356163623735616237313234383037 Sep 6 00:29:41.073000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.073000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3423 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653739333566393738363034356163623735616237313234383037 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit: BPF prog-id=147 op=LOAD Sep 6 00:29:41.074000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c00f0 items=0 ppid=3423 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653739333566393738363034356163623735616237313234383037 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit: BPF prog-id=148 op=LOAD Sep 6 00:29:41.074000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c0138 items=0 ppid=3423 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653739333566393738363034356163623735616237313234383037 Sep 6 00:29:41.074000 audit: BPF prog-id=148 op=UNLOAD Sep 6 00:29:41.074000 audit: BPF prog-id=147 op=UNLOAD Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:41.074000 audit: BPF prog-id=149 op=LOAD Sep 6 00:29:41.074000 audit[3466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c0548 items=0 ppid=3423 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366653739333566393738363034356163623735616237313234383037 Sep 6 00:29:41.103365 env[1201]: time="2025-09-06T00:29:41.103276806Z" level=info msg="StartContainer for \"3fe7935f9786045acb75ab71248077f698b429ea72b5f3f6a5279b0dbe180ee8\" returns successfully" Sep 6 00:29:41.341750 systemd[1]: var-lib-kubelet-pods-b9c5fe4a\x2df9f3\x2d45c7\x2da5d6\x2da53c9aa9ecc7-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dqvpt2.mount: Deactivated successfully. Sep 6 00:29:41.341911 systemd[1]: var-lib-kubelet-pods-b9c5fe4a\x2df9f3\x2d45c7\x2da5d6\x2da53c9aa9ecc7-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 6 00:29:41.353000 audit[3476]: AVC avc: denied { getattr } for pid=3476 comm="coredns" path="cgroup:[4026532682]" dev="nsfs" ino=4026532682 scontext=system_u:system_r:svirt_lxc_net_t:s0:c814,c924 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 6 00:29:41.353000 audit[3476]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00012e978 a2=c0005a82a8 a3=0 items=0 ppid=3423 pid=3476 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c814,c924 key=(null) Sep 6 00:29:41.353000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 6 00:29:41.426823 kubelet[2027]: I0906 00:29:41.426686 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-qp2t8" podStartSLOduration=52.426564664 podStartE2EDuration="52.426564664s" podCreationTimestamp="2025-09-06 00:28:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 00:29:41.425031639 +0000 UTC m=+56.924978388" watchObservedRunningTime="2025-09-06 00:29:41.426564664 +0000 UTC m=+56.926511409" Sep 6 00:29:41.713976 systemd[1]: Created slice kubepods-besteffort-pod0dca0c98_a852_4f0a_9119_691d410130d1.slice. Sep 6 00:29:41.729985 kubelet[2027]: I0906 00:29:41.729930 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0dca0c98-a852-4f0a-9119-691d410130d1-whisker-backend-key-pair\") pod \"whisker-5567488d76-4r99m\" (UID: \"0dca0c98-a852-4f0a-9119-691d410130d1\") " pod="calico-system/whisker-5567488d76-4r99m" Sep 6 00:29:41.730347 kubelet[2027]: I0906 00:29:41.730316 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0dca0c98-a852-4f0a-9119-691d410130d1-whisker-ca-bundle\") pod \"whisker-5567488d76-4r99m\" (UID: \"0dca0c98-a852-4f0a-9119-691d410130d1\") " pod="calico-system/whisker-5567488d76-4r99m" Sep 6 00:29:41.730530 kubelet[2027]: I0906 00:29:41.730491 2027 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6st69\" (UniqueName: \"kubernetes.io/projected/0dca0c98-a852-4f0a-9119-691d410130d1-kube-api-access-6st69\") pod \"whisker-5567488d76-4r99m\" (UID: \"0dca0c98-a852-4f0a-9119-691d410130d1\") " pod="calico-system/whisker-5567488d76-4r99m" Sep 6 00:29:41.736000 audit[3562]: AVC avc: denied { write } for pid=3562 comm="tee" name="fd" dev="proc" ino=29689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.736000 audit[3562]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc77f7a7c5 a2=241 a3=1b6 items=1 ppid=3525 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.736000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 00:29:41.736000 audit: PATH item=0 name="/dev/fd/63" inode=30254 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.736000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.743000 audit[3564]: AVC avc: denied { write } for pid=3564 comm="tee" name="fd" dev="proc" ino=29695 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.743000 audit[3564]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd78abc7c5 a2=241 a3=1b6 items=1 ppid=3524 pid=3564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.743000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 00:29:41.743000 audit: PATH item=0 name="/dev/fd/63" inode=30255 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.743000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.766000 audit[3574]: AVC avc: denied { write } for pid=3574 comm="tee" name="fd" dev="proc" ino=30732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.766000 audit[3574]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec55317c6 a2=241 a3=1b6 items=1 ppid=3539 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.766000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 00:29:41.766000 audit: PATH item=0 name="/dev/fd/63" inode=30264 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.785000 audit[3572]: AVC avc: denied { write } for pid=3572 comm="tee" name="fd" dev="proc" ino=30736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.785000 audit[3572]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd48c347c5 a2=241 a3=1b6 items=1 ppid=3522 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.785000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 00:29:41.785000 audit: PATH item=0 name="/dev/fd/63" inode=30260 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.785000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.810000 audit[3587]: AVC avc: denied { write } for pid=3587 comm="tee" name="fd" dev="proc" ino=30278 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.811000 audit[3584]: AVC avc: denied { write } for pid=3584 comm="tee" name="fd" dev="proc" ino=30281 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.816880 env[1201]: time="2025-09-06T00:29:41.816110070Z" level=info msg="StopPodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\"" Sep 6 00:29:41.819272 env[1201]: time="2025-09-06T00:29:41.817823030Z" level=info msg="StopPodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\"" Sep 6 00:29:41.811000 audit[3584]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffde2617b6 a2=241 a3=1b6 items=1 ppid=3536 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.811000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 00:29:41.811000 audit: PATH item=0 name="/dev/fd/63" inode=30267 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.811000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.810000 audit[3587]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd535fc7b5 a2=241 a3=1b6 items=1 ppid=3532 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.810000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 00:29:41.810000 audit: PATH item=0 name="/dev/fd/63" inode=30270 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.810000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.878000 audit[3590]: AVC avc: denied { write } for pid=3590 comm="tee" name="fd" dev="proc" ino=30779 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 00:29:41.878000 audit[3590]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4bd417c7 a2=241 a3=1b6 items=1 ppid=3531 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.878000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 00:29:41.878000 audit: PATH item=0 name="/dev/fd/63" inode=30271 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 00:29:41.878000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 00:29:41.990000 audit[3632]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=3632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:41.990000 audit[3632]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffea680ef0 a2=0 a3=7fffea680edc items=0 ppid=2136 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:41.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:42.026000 audit[3632]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:42.026000 audit[3632]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffea680ef0 a2=0 a3=0 items=0 ppid=2136 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:42.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:42.029943 env[1201]: time="2025-09-06T00:29:42.029889826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5567488d76-4r99m,Uid:0dca0c98-a852-4f0a-9119-691d410130d1,Namespace:calico-system,Attempt:0,}" Sep 6 00:29:42.190944 systemd-networkd[1025]: cali209146bdc1d: Gained IPv6LL Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.021 [INFO][3623] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.021 [INFO][3623] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" iface="eth0" netns="/var/run/netns/cni-f17538da-ec88-6c00-1d49-ae12cab2ea5c" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.031 [INFO][3623] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" iface="eth0" netns="/var/run/netns/cni-f17538da-ec88-6c00-1d49-ae12cab2ea5c" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.044 [INFO][3623] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" iface="eth0" netns="/var/run/netns/cni-f17538da-ec88-6c00-1d49-ae12cab2ea5c" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.057 [INFO][3623] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.057 [INFO][3623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.238 [INFO][3641] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.244 [INFO][3641] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.244 [INFO][3641] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.280 [WARNING][3641] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.280 [INFO][3641] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.306 [INFO][3641] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:42.326969 env[1201]: 2025-09-06 00:29:42.310 [INFO][3623] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:42.334020 env[1201]: time="2025-09-06T00:29:42.333951877Z" level=info msg="TearDown network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" successfully" Sep 6 00:29:42.338050 systemd[1]: run-netns-cni\x2df17538da\x2dec88\x2d6c00\x2d1d49\x2dae12cab2ea5c.mount: Deactivated successfully. Sep 6 00:29:42.339925 env[1201]: time="2025-09-06T00:29:42.339852139Z" level=info msg="StopPodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" returns successfully" Sep 6 00:29:42.346606 env[1201]: time="2025-09-06T00:29:42.346137554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-r5dpj,Uid:2b7f227d-4c16-4db2-a0c5-43bb1c516235,Namespace:calico-apiserver,Attempt:1,}" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.161 [INFO][3617] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.161 [INFO][3617] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" iface="eth0" netns="/var/run/netns/cni-bbc79998-e7a4-527e-a2a6-9aee954a4c31" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.161 [INFO][3617] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" iface="eth0" netns="/var/run/netns/cni-bbc79998-e7a4-527e-a2a6-9aee954a4c31" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.162 [INFO][3617] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" iface="eth0" netns="/var/run/netns/cni-bbc79998-e7a4-527e-a2a6-9aee954a4c31" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.162 [INFO][3617] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.162 [INFO][3617] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.387 [INFO][3647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.389 [INFO][3647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.390 [INFO][3647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.409 [WARNING][3647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.409 [INFO][3647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.422 [INFO][3647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:42.440698 env[1201]: 2025-09-06 00:29:42.432 [INFO][3617] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:42.446976 env[1201]: time="2025-09-06T00:29:42.444386780Z" level=info msg="TearDown network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" successfully" Sep 6 00:29:42.446976 env[1201]: time="2025-09-06T00:29:42.444444886Z" level=info msg="StopPodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" returns successfully" Sep 6 00:29:42.444079 systemd[1]: run-netns-cni\x2dbbc79998\x2de7a4\x2d527e\x2da2a6\x2d9aee954a4c31.mount: Deactivated successfully. Sep 6 00:29:42.449896 env[1201]: time="2025-09-06T00:29:42.449849464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-ffdth,Uid:7d1f646d-5a60-49b2-83f9-87ae9cc20b46,Namespace:calico-system,Attempt:1,}" Sep 6 00:29:42.498000 audit[3676]: NETFILTER_CFG table=filter:103 family=2 entries=17 op=nft_register_rule pid=3676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:42.498000 audit[3676]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffef3876ea0 a2=0 a3=7ffef3876e8c items=0 ppid=2136 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:42.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:42.505000 audit[3676]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:42.505000 audit[3676]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffef3876ea0 a2=0 a3=7ffef3876e8c items=0 ppid=2136 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:42.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:42.829561 kubelet[2027]: I0906 00:29:42.829352 2027 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7" path="/var/lib/kubelet/pods/b9c5fe4a-f9f3-45c7-a5d6-a53c9aa9ecc7/volumes" Sep 6 00:29:42.857811 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:29:42.858007 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7583f0356e: link becomes ready Sep 6 00:29:42.854108 systemd-networkd[1025]: calia7583f0356e: Link UP Sep 6 00:29:42.860755 systemd-networkd[1025]: calia7583f0356e: Gained carrier Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.470 [INFO][3653] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.520 [INFO][3653] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0 whisker-5567488d76- calico-system 0dca0c98-a852-4f0a-9119-691d410130d1 956 0 2025-09-06 00:29:41 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:5567488d76 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com whisker-5567488d76-4r99m eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calia7583f0356e [] [] }} ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.520 [INFO][3653] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.744 [INFO][3679] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" HandleID="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.745 [INFO][3679] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" HandleID="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccc90), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-vva2b.gb1.brightbox.com", "pod":"whisker-5567488d76-4r99m", "timestamp":"2025-09-06 00:29:42.744807724 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.745 [INFO][3679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.745 [INFO][3679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.745 [INFO][3679] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.762 [INFO][3679] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.778 [INFO][3679] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.786 [INFO][3679] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.792 [INFO][3679] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.796 [INFO][3679] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.796 [INFO][3679] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.801 [INFO][3679] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1 Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.820 [INFO][3679] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.843 [INFO][3679] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.2/26] block=192.168.76.0/26 handle="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.843 [INFO][3679] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.2/26] handle="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.843 [INFO][3679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:42.936803 env[1201]: 2025-09-06 00:29:42.843 [INFO][3679] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.2/26] IPv6=[] ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" HandleID="k8s-pod-network.a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:42.941624 env[1201]: 2025-09-06 00:29:42.849 [INFO][3653] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0", GenerateName:"whisker-5567488d76-", Namespace:"calico-system", SelfLink:"", UID:"0dca0c98-a852-4f0a-9119-691d410130d1", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5567488d76", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"whisker-5567488d76-4r99m", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.76.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calia7583f0356e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:42.941624 env[1201]: 2025-09-06 00:29:42.849 [INFO][3653] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.2/32] ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:42.941624 env[1201]: 2025-09-06 00:29:42.849 [INFO][3653] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia7583f0356e ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:42.941624 env[1201]: 2025-09-06 00:29:42.863 [INFO][3653] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:42.941624 env[1201]: 2025-09-06 00:29:42.864 [INFO][3653] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0", GenerateName:"whisker-5567488d76-", Namespace:"calico-system", SelfLink:"", UID:"0dca0c98-a852-4f0a-9119-691d410130d1", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5567488d76", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1", Pod:"whisker-5567488d76-4r99m", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.76.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calia7583f0356e", MAC:"d2:e8:d5:4a:9d:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:42.941624 env[1201]: 2025-09-06 00:29:42.896 [INFO][3653] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1" Namespace="calico-system" Pod="whisker-5567488d76-4r99m" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--5567488d76--4r99m-eth0" Sep 6 00:29:43.074895 env[1201]: time="2025-09-06T00:29:43.070573459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:43.074895 env[1201]: time="2025-09-06T00:29:43.070695913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:43.074895 env[1201]: time="2025-09-06T00:29:43.070715687Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:43.074895 env[1201]: time="2025-09-06T00:29:43.071012214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1 pid=3724 runtime=io.containerd.runc.v2 Sep 6 00:29:43.088328 systemd-networkd[1025]: cali339bb103943: Link UP Sep 6 00:29:43.095148 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali339bb103943: link becomes ready Sep 6 00:29:43.093781 systemd-networkd[1025]: cali339bb103943: Gained carrier Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.562 [INFO][3664] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.597 [INFO][3664] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0 calico-apiserver-78f697856d- calico-apiserver 2b7f227d-4c16-4db2-a0c5-43bb1c516235 960 0 2025-09-06 00:29:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78f697856d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com calico-apiserver-78f697856d-r5dpj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali339bb103943 [] [] }} ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.597 [INFO][3664] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.881 [INFO][3695] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" HandleID="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.882 [INFO][3695] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" HandleID="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004fe90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-vva2b.gb1.brightbox.com", "pod":"calico-apiserver-78f697856d-r5dpj", "timestamp":"2025-09-06 00:29:42.878948384 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.882 [INFO][3695] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.882 [INFO][3695] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.882 [INFO][3695] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.921 [INFO][3695] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:42.967 [INFO][3695] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.009 [INFO][3695] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.015 [INFO][3695] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.022 [INFO][3695] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.023 [INFO][3695] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.030 [INFO][3695] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47 Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.040 [INFO][3695] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.062 [INFO][3695] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.3/26] block=192.168.76.0/26 handle="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.062 [INFO][3695] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.3/26] handle="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.062 [INFO][3695] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:43.142183 env[1201]: 2025-09-06 00:29:43.062 [INFO][3695] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.3/26] IPv6=[] ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" HandleID="k8s-pod-network.c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.144025 env[1201]: 2025-09-06 00:29:43.068 [INFO][3664] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b7f227d-4c16-4db2-a0c5-43bb1c516235", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-78f697856d-r5dpj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali339bb103943", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:43.144025 env[1201]: 2025-09-06 00:29:43.068 [INFO][3664] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.3/32] ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.144025 env[1201]: 2025-09-06 00:29:43.068 [INFO][3664] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali339bb103943 ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.144025 env[1201]: 2025-09-06 00:29:43.096 [INFO][3664] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.144025 env[1201]: 2025-09-06 00:29:43.097 [INFO][3664] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b7f227d-4c16-4db2-a0c5-43bb1c516235", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47", Pod:"calico-apiserver-78f697856d-r5dpj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali339bb103943", MAC:"96:2f:a0:15:64:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:43.144025 env[1201]: 2025-09-06 00:29:43.132 [INFO][3664] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-r5dpj" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:43.219417 systemd[1]: Started cri-containerd-a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1.scope. Sep 6 00:29:43.222755 env[1201]: time="2025-09-06T00:29:43.222509962Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:43.222755 env[1201]: time="2025-09-06T00:29:43.222670529Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:43.223070 env[1201]: time="2025-09-06T00:29:43.223002322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:43.239283 env[1201]: time="2025-09-06T00:29:43.238982573Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47 pid=3759 runtime=io.containerd.runc.v2 Sep 6 00:29:43.290865 systemd[1]: Started cri-containerd-c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47.scope. Sep 6 00:29:43.308313 systemd-networkd[1025]: calie6e1ee7ea62: Link UP Sep 6 00:29:43.316051 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie6e1ee7ea62: link becomes ready Sep 6 00:29:43.314484 systemd-networkd[1025]: calie6e1ee7ea62: Gained carrier Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.362000 audit: BPF prog-id=150 op=LOAD Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3759 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333343336623661363938303934373162623966666461336464363031 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3759 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333343336623661363938303934373162623966666461336464363031 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit: BPF prog-id=151 op=LOAD Sep 6 00:29:43.365000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000318600 items=0 ppid=3759 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333343336623661363938303934373162623966666461336464363031 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit: BPF prog-id=152 op=LOAD Sep 6 00:29:43.365000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000318648 items=0 ppid=3759 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333343336623661363938303934373162623966666461336464363031 Sep 6 00:29:43.365000 audit: BPF prog-id=152 op=UNLOAD Sep 6 00:29:43.365000 audit: BPF prog-id=151 op=UNLOAD Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { perfmon } for pid=3770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit[3770]: AVC avc: denied { bpf } for pid=3770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.365000 audit: BPF prog-id=153 op=LOAD Sep 6 00:29:43.365000 audit[3770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000318a58 items=0 ppid=3759 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333343336623661363938303934373162623966666461336464363031 Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:42.800 [INFO][3684] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:42.852 [INFO][3684] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0 goldmane-54d579b49d- calico-system 7d1f646d-5a60-49b2-83f9-87ae9cc20b46 961 0 2025-09-06 00:29:07 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:54d579b49d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com goldmane-54d579b49d-ffdth eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calie6e1ee7ea62 [] [] }} ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:42.852 [INFO][3684] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.165 [INFO][3707] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" HandleID="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.180 [INFO][3707] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" HandleID="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd840), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-vva2b.gb1.brightbox.com", "pod":"goldmane-54d579b49d-ffdth", "timestamp":"2025-09-06 00:29:43.164995765 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.180 [INFO][3707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.180 [INFO][3707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.180 [INFO][3707] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.202 [INFO][3707] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.213 [INFO][3707] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.238 [INFO][3707] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.246 [INFO][3707] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.256 [INFO][3707] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.256 [INFO][3707] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.264 [INFO][3707] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.272 [INFO][3707] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.295 [INFO][3707] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.4/26] block=192.168.76.0/26 handle="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.295 [INFO][3707] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.4/26] handle="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.295 [INFO][3707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:43.390123 env[1201]: 2025-09-06 00:29:43.295 [INFO][3707] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.4/26] IPv6=[] ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" HandleID="k8s-pod-network.46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.391477 env[1201]: 2025-09-06 00:29:43.303 [INFO][3684] cni-plugin/k8s.go 418: Populated endpoint ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7d1f646d-5a60-49b2-83f9-87ae9cc20b46", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-54d579b49d-ffdth", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.76.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie6e1ee7ea62", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:43.391477 env[1201]: 2025-09-06 00:29:43.303 [INFO][3684] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.4/32] ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.391477 env[1201]: 2025-09-06 00:29:43.303 [INFO][3684] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie6e1ee7ea62 ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.391477 env[1201]: 2025-09-06 00:29:43.356 [INFO][3684] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.391477 env[1201]: 2025-09-06 00:29:43.356 [INFO][3684] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7d1f646d-5a60-49b2-83f9-87ae9cc20b46", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc", Pod:"goldmane-54d579b49d-ffdth", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.76.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie6e1ee7ea62", MAC:"c2:36:94:3b:13:2c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:43.391477 env[1201]: 2025-09-06 00:29:43.387 [INFO][3684] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc" Namespace="calico-system" Pod="goldmane-54d579b49d-ffdth" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:43.427923 env[1201]: time="2025-09-06T00:29:43.427746692Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:43.428368 env[1201]: time="2025-09-06T00:29:43.428241740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:43.428554 env[1201]: time="2025-09-06T00:29:43.428498930Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:43.429383 env[1201]: time="2025-09-06T00:29:43.429264801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc pid=3808 runtime=io.containerd.runc.v2 Sep 6 00:29:43.478983 systemd[1]: Started cri-containerd-46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc.scope. Sep 6 00:29:43.497122 kernel: kauditd_printk_skb: 278 callbacks suppressed Sep 6 00:29:43.497476 kernel: audit: type=1400 audit(1757118583.484:1084): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.506771 kernel: audit: type=1400 audit(1757118583.484:1085): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.516893 kernel: audit: type=1400 audit(1757118583.484:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.527124 kernel: audit: type=1400 audit(1757118583.484:1087): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.534125 kernel: audit: type=1400 audit(1757118583.484:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.546801 kernel: audit: type=1400 audit(1757118583.484:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.546995 kernel: audit: type=1400 audit(1757118583.484:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.557136 kernel: audit: type=1400 audit(1757118583.484:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.564125 kernel: audit: type=1400 audit(1757118583.484:1092): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.571124 kernel: audit: type=1400 audit(1757118583.484:1093): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.484000 audit: BPF prog-id=154 op=LOAD Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643839306231383863333562666265633136303134396338343631 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643839306231383863333562666265633136303134396338343631 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.498000 audit: BPF prog-id=155 op=LOAD Sep 6 00:29:43.498000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000316da0 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643839306231383863333562666265633136303134396338343631 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit: BPF prog-id=156 op=LOAD Sep 6 00:29:43.499000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000316de8 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643839306231383863333562666265633136303134396338343631 Sep 6 00:29:43.499000 audit: BPF prog-id=156 op=UNLOAD Sep 6 00:29:43.499000 audit: BPF prog-id=155 op=UNLOAD Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.499000 audit: BPF prog-id=157 op=LOAD Sep 6 00:29:43.499000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003171f8 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643839306231383863333562666265633136303134396338343631 Sep 6 00:29:43.597228 env[1201]: time="2025-09-06T00:29:43.597135216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-r5dpj,Uid:2b7f227d-4c16-4db2-a0c5-43bb1c516235,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47\"" Sep 6 00:29:43.600558 env[1201]: time="2025-09-06T00:29:43.600506307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.610000 audit: BPF prog-id=158 op=LOAD Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3808 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616638663063656265343865313134376361646636303036326336 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3808 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616638663063656265343865313134376361646636303036326336 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit: BPF prog-id=159 op=LOAD Sep 6 00:29:43.612000 audit[3819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00029d580 items=0 ppid=3808 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616638663063656265343865313134376361646636303036326336 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.612000 audit: BPF prog-id=160 op=LOAD Sep 6 00:29:43.612000 audit[3819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00029d5c8 items=0 ppid=3808 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616638663063656265343865313134376361646636303036326336 Sep 6 00:29:43.613000 audit: BPF prog-id=160 op=UNLOAD Sep 6 00:29:43.613000 audit: BPF prog-id=159 op=UNLOAD Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { perfmon } for pid=3819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit[3819]: AVC avc: denied { bpf } for pid=3819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.613000 audit: BPF prog-id=161 op=LOAD Sep 6 00:29:43.613000 audit[3819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00029d9d8 items=0 ppid=3808 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436616638663063656265343865313134376361646636303036326336 Sep 6 00:29:43.680322 env[1201]: time="2025-09-06T00:29:43.680261348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5567488d76-4r99m,Uid:0dca0c98-a852-4f0a-9119-691d410130d1,Namespace:calico-system,Attempt:0,} returns sandbox id \"a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1\"" Sep 6 00:29:43.757078 env[1201]: time="2025-09-06T00:29:43.757018813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-ffdth,Uid:7d1f646d-5a60-49b2-83f9-87ae9cc20b46,Namespace:calico-system,Attempt:1,} returns sandbox id \"46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc\"" Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.828000 audit: BPF prog-id=162 op=LOAD Sep 6 00:29:43.828000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18fd72a0 a2=98 a3=1fffffffffffffff items=0 ppid=3523 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.828000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:29:43.829000 audit: BPF prog-id=162 op=UNLOAD Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.830000 audit: BPF prog-id=163 op=LOAD Sep 6 00:29:43.830000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18fd7180 a2=94 a3=3 items=0 ppid=3523 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.830000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:29:43.832000 audit: BPF prog-id=163 op=UNLOAD Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit[3878]: AVC avc: denied { bpf } for pid=3878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.832000 audit: BPF prog-id=164 op=LOAD Sep 6 00:29:43.832000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18fd71c0 a2=94 a3=7ffd18fd73a0 items=0 ppid=3523 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.832000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:29:43.833000 audit: BPF prog-id=164 op=UNLOAD Sep 6 00:29:43.834000 audit[3878]: AVC avc: denied { perfmon } for pid=3878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.834000 audit[3878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd18fd7290 a2=50 a3=a000000085 items=0 ppid=3523 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.834000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.838000 audit: BPF prog-id=165 op=LOAD Sep 6 00:29:43.838000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc50f4f4e0 a2=98 a3=3 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:43.838000 audit: BPF prog-id=165 op=UNLOAD Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit: BPF prog-id=166 op=LOAD Sep 6 00:29:43.839000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc50f4f2d0 a2=94 a3=54428f items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:43.839000 audit: BPF prog-id=166 op=UNLOAD Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:43.839000 audit: BPF prog-id=167 op=LOAD Sep 6 00:29:43.839000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc50f4f300 a2=94 a3=2 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:43.839000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:43.839000 audit: BPF prog-id=167 op=UNLOAD Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.011000 audit: BPF prog-id=168 op=LOAD Sep 6 00:29:44.011000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc50f4f1c0 a2=94 a3=1 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.011000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.013000 audit: BPF prog-id=168 op=UNLOAD Sep 6 00:29:44.013000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.013000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc50f4f290 a2=50 a3=7ffc50f4f370 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.013000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.032000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.032000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc50f4f1d0 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.032000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc50f4f200 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc50f4f110 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc50f4f220 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc50f4f200 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc50f4f1f0 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc50f4f220 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc50f4f200 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc50f4f220 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc50f4f1f0 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc50f4f260 a2=28 a3=0 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc50f4f010 a2=50 a3=1 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.033000 audit: BPF prog-id=169 op=LOAD Sep 6 00:29:44.033000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc50f4f010 a2=94 a3=5 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.033000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.034000 audit: BPF prog-id=169 op=UNLOAD Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc50f4f0c0 a2=50 a3=1 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc50f4f1e0 a2=4 a3=38 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { confidentiality } for pid=3882 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:29:44.034000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc50f4f230 a2=94 a3=6 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.034000 audit[3882]: AVC avc: denied { confidentiality } for pid=3882 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:29:44.034000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc50f4e9e0 a2=94 a3=88 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.035000 audit[3882]: AVC avc: denied { confidentiality } for pid=3882 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:29:44.035000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc50f4e9e0 a2=94 a3=88 items=0 ppid=3523 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit: BPF prog-id=170 op=LOAD Sep 6 00:29:44.062000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebf2aa450 a2=98 a3=1999999999999999 items=0 ppid=3523 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.062000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:29:44.062000 audit: BPF prog-id=170 op=UNLOAD Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.062000 audit: BPF prog-id=171 op=LOAD Sep 6 00:29:44.062000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebf2aa330 a2=94 a3=ffff items=0 ppid=3523 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.062000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:29:44.063000 audit: BPF prog-id=171 op=UNLOAD Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.063000 audit: BPF prog-id=172 op=LOAD Sep 6 00:29:44.063000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebf2aa370 a2=94 a3=7ffebf2aa550 items=0 ppid=3523 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.063000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 00:29:44.063000 audit: BPF prog-id=172 op=UNLOAD Sep 6 00:29:44.106576 systemd-networkd[1025]: calia7583f0356e: Gained IPv6LL Sep 6 00:29:44.210685 systemd-networkd[1025]: vxlan.calico: Link UP Sep 6 00:29:44.210703 systemd-networkd[1025]: vxlan.calico: Gained carrier Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.259000 audit: BPF prog-id=173 op=LOAD Sep 6 00:29:44.259000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb50d6760 a2=98 a3=20 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.259000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.260000 audit: BPF prog-id=173 op=UNLOAD Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.262000 audit: BPF prog-id=174 op=LOAD Sep 6 00:29:44.262000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb50d6570 a2=94 a3=54428f items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.272000 audit: BPF prog-id=174 op=UNLOAD Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit: BPF prog-id=175 op=LOAD Sep 6 00:29:44.272000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb50d65a0 a2=94 a3=2 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.272000 audit: BPF prog-id=175 op=UNLOAD Sep 6 00:29:44.272000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.272000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb50d6470 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb50d64a0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb50d63b0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb50d64c0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb50d64a0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb50d6490 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb50d64c0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb50d64a0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb50d64c0 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb50d6490 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.275000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.275000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb50d6500 a2=28 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.275000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.277000 audit: BPF prog-id=176 op=LOAD Sep 6 00:29:44.277000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb50d6370 a2=94 a3=0 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.277000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.279000 audit: BPF prog-id=176 op=UNLOAD Sep 6 00:29:44.286000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.286000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffb50d6360 a2=50 a3=2800 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.286000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffb50d6360 a2=50 a3=2800 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.287000 audit: BPF prog-id=177 op=LOAD Sep 6 00:29:44.287000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb50d5b80 a2=94 a3=2 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.287000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.296000 audit: BPF prog-id=177 op=UNLOAD Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.296000 audit: BPF prog-id=178 op=LOAD Sep 6 00:29:44.296000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb50d5c80 a2=94 a3=30 items=0 ppid=3523 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.296000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.306000 audit: BPF prog-id=179 op=LOAD Sep 6 00:29:44.306000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcbc44050 a2=98 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.306000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.307000 audit: BPF prog-id=179 op=UNLOAD Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.307000 audit: BPF prog-id=180 op=LOAD Sep 6 00:29:44.307000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcbc43e40 a2=94 a3=54428f items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.311000 audit: BPF prog-id=180 op=UNLOAD Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.311000 audit: BPF prog-id=181 op=LOAD Sep 6 00:29:44.311000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcbc43e70 a2=94 a3=2 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.313000 audit: BPF prog-id=181 op=UNLOAD Sep 6 00:29:44.490408 systemd-networkd[1025]: cali339bb103943: Gained IPv6LL Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit: BPF prog-id=182 op=LOAD Sep 6 00:29:44.528000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcbc43d30 a2=94 a3=1 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.528000 audit: BPF prog-id=182 op=UNLOAD Sep 6 00:29:44.528000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.528000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffcbc43e00 a2=50 a3=7fffcbc43ee0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.547000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.547000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcbc43d40 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.547000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.547000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.547000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcbc43d70 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.547000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.547000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.547000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcbc43c80 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.547000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcbc43d90 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcbc43d70 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcbc43d60 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcbc43d90 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcbc43d70 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcbc43d90 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcbc43d60 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcbc43dd0 a2=28 a3=0 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcbc43b80 a2=50 a3=1 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.548000 audit: BPF prog-id=183 op=LOAD Sep 6 00:29:44.548000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcbc43b80 a2=94 a3=5 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.548000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.549000 audit: BPF prog-id=183 op=UNLOAD Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcbc43c30 a2=50 a3=1 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffcbc43d50 a2=4 a3=38 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { confidentiality } for pid=3928 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:29:44.549000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcbc43da0 a2=94 a3=6 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.549000 audit[3928]: AVC avc: denied { confidentiality } for pid=3928 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:29:44.549000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcbc43550 a2=94 a3=88 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { confidentiality } for pid=3928 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 00:29:44.550000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcbc43550 a2=94 a3=88 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.550000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcbc44f80 a2=10 a3=f8f00800 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.550000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcbc44e20 a2=10 a3=3 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.550000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.550000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.550000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcbc44dc0 a2=10 a3=3 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.550000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.551000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:44.551000 audit[3928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcbc44dc0 a2=10 a3=7 items=0 ppid=3523 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.551000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 00:29:44.571000 audit: BPF prog-id=178 op=UNLOAD Sep 6 00:29:44.684321 systemd-networkd[1025]: calie6e1ee7ea62: Gained IPv6LL Sep 6 00:29:44.774000 audit[3955]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=3955 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:44.774000 audit[3955]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffea943ee40 a2=0 a3=7ffea943ee2c items=0 ppid=3523 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.774000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:44.795000 audit[3954]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=3954 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:44.795000 audit[3954]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeb933a6b0 a2=0 a3=7ffeb933a69c items=0 ppid=3523 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:44.819000 audit[3953]: NETFILTER_CFG table=raw:107 family=2 entries=21 op=nft_register_chain pid=3953 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:44.819000 audit[3953]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd38794890 a2=0 a3=7ffd3879487c items=0 ppid=3523 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.819000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:44.824000 audit[3956]: NETFILTER_CFG table=filter:108 family=2 entries=206 op=nft_register_chain pid=3956 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:44.824000 audit[3956]: SYSCALL arch=c000003e syscall=46 success=yes exit=120356 a0=3 a1=7ffd553cb2d0 a2=0 a3=55f1314f6000 items=0 ppid=3523 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:44.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:44.879533 env[1201]: time="2025-09-06T00:29:44.879424841Z" level=info msg="StopPodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\"" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.017 [WARNING][3979] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7d1f646d-5a60-49b2-83f9-87ae9cc20b46", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc", Pod:"goldmane-54d579b49d-ffdth", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.76.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie6e1ee7ea62", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.017 [INFO][3979] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.017 [INFO][3979] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" iface="eth0" netns="" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.018 [INFO][3979] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.025 [INFO][3979] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.085 [INFO][3988] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.086 [INFO][3988] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.086 [INFO][3988] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.101 [WARNING][3988] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.101 [INFO][3988] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.105 [INFO][3988] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:45.126798 env[1201]: 2025-09-06 00:29:45.117 [INFO][3979] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.126798 env[1201]: time="2025-09-06T00:29:45.126506917Z" level=info msg="TearDown network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" successfully" Sep 6 00:29:45.126798 env[1201]: time="2025-09-06T00:29:45.126565564Z" level=info msg="StopPodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" returns successfully" Sep 6 00:29:45.129408 env[1201]: time="2025-09-06T00:29:45.128577428Z" level=info msg="RemovePodSandbox for \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\"" Sep 6 00:29:45.129408 env[1201]: time="2025-09-06T00:29:45.128638908Z" level=info msg="Forcibly stopping sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\"" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.218 [WARNING][4005] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"7d1f646d-5a60-49b2-83f9-87ae9cc20b46", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc", Pod:"goldmane-54d579b49d-ffdth", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.76.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie6e1ee7ea62", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.219 [INFO][4005] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.219 [INFO][4005] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" iface="eth0" netns="" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.219 [INFO][4005] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.219 [INFO][4005] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.289 [INFO][4013] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.290 [INFO][4013] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.290 [INFO][4013] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.308 [WARNING][4013] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.308 [INFO][4013] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" HandleID="k8s-pod-network.ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Workload="srv--vva2b.gb1.brightbox.com-k8s-goldmane--54d579b49d--ffdth-eth0" Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.312 [INFO][4013] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:45.323579 env[1201]: 2025-09-06 00:29:45.314 [INFO][4005] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21" Sep 6 00:29:45.323579 env[1201]: time="2025-09-06T00:29:45.318938263Z" level=info msg="TearDown network for sandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" successfully" Sep 6 00:29:45.345457 env[1201]: time="2025-09-06T00:29:45.345377285Z" level=info msg="RemovePodSandbox \"ede65e703eaf95af814750561fcd34e4190954ea9578c0dce865af497e2fce21\" returns successfully" Sep 6 00:29:45.346695 env[1201]: time="2025-09-06T00:29:45.346654345Z" level=info msg="StopPodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\"" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.496 [WARNING][4029] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b7f227d-4c16-4db2-a0c5-43bb1c516235", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47", Pod:"calico-apiserver-78f697856d-r5dpj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali339bb103943", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.497 [INFO][4029] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.497 [INFO][4029] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" iface="eth0" netns="" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.497 [INFO][4029] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.497 [INFO][4029] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.564 [INFO][4036] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.564 [INFO][4036] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.564 [INFO][4036] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.581 [WARNING][4036] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.582 [INFO][4036] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.595 [INFO][4036] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:45.606192 env[1201]: 2025-09-06 00:29:45.598 [INFO][4029] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.606192 env[1201]: time="2025-09-06T00:29:45.602027391Z" level=info msg="TearDown network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" successfully" Sep 6 00:29:45.606192 env[1201]: time="2025-09-06T00:29:45.602078522Z" level=info msg="StopPodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" returns successfully" Sep 6 00:29:45.608240 env[1201]: time="2025-09-06T00:29:45.608186918Z" level=info msg="RemovePodSandbox for \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\"" Sep 6 00:29:45.608352 env[1201]: time="2025-09-06T00:29:45.608247273Z" level=info msg="Forcibly stopping sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\"" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.695 [WARNING][4050] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"2b7f227d-4c16-4db2-a0c5-43bb1c516235", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47", Pod:"calico-apiserver-78f697856d-r5dpj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali339bb103943", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.696 [INFO][4050] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.696 [INFO][4050] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" iface="eth0" netns="" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.696 [INFO][4050] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.696 [INFO][4050] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.762 [INFO][4057] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.762 [INFO][4057] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.762 [INFO][4057] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.785 [WARNING][4057] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.785 [INFO][4057] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" HandleID="k8s-pod-network.35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--r5dpj-eth0" Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.797 [INFO][4057] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:45.802300 env[1201]: 2025-09-06 00:29:45.799 [INFO][4050] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1" Sep 6 00:29:45.803692 env[1201]: time="2025-09-06T00:29:45.803253251Z" level=info msg="TearDown network for sandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" successfully" Sep 6 00:29:45.807871 env[1201]: time="2025-09-06T00:29:45.807812118Z" level=info msg="RemovePodSandbox \"35e183fa08c5482fcc77d7b6b14f1707c22a11a4c2a4189169970f4e081007e1\" returns successfully" Sep 6 00:29:45.809379 env[1201]: time="2025-09-06T00:29:45.808836443Z" level=info msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:45.908 [WARNING][4074] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:45.909 [INFO][4074] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:45.909 [INFO][4074] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" iface="eth0" netns="" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:45.909 [INFO][4074] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:45.909 [INFO][4074] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.011 [INFO][4081] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.012 [INFO][4081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.012 [INFO][4081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.028 [WARNING][4081] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.028 [INFO][4081] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.031 [INFO][4081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:46.037479 env[1201]: 2025-09-06 00:29:46.034 [INFO][4074] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.038807 env[1201]: time="2025-09-06T00:29:46.038266875Z" level=info msg="TearDown network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" successfully" Sep 6 00:29:46.038807 env[1201]: time="2025-09-06T00:29:46.038337113Z" level=info msg="StopPodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" returns successfully" Sep 6 00:29:46.039342 env[1201]: time="2025-09-06T00:29:46.039289774Z" level=info msg="RemovePodSandbox for \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" Sep 6 00:29:46.039488 env[1201]: time="2025-09-06T00:29:46.039401582Z" level=info msg="Forcibly stopping sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\"" Sep 6 00:29:46.155485 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.144 [WARNING][4096] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.145 [INFO][4096] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.145 [INFO][4096] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" iface="eth0" netns="" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.145 [INFO][4096] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.145 [INFO][4096] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.230 [INFO][4104] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.231 [INFO][4104] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.231 [INFO][4104] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.246 [WARNING][4104] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.246 [INFO][4104] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" HandleID="k8s-pod-network.b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Workload="srv--vva2b.gb1.brightbox.com-k8s-whisker--86f5b6cb8f--jvsl7-eth0" Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.250 [INFO][4104] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:46.256335 env[1201]: 2025-09-06 00:29:46.252 [INFO][4096] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f" Sep 6 00:29:46.256335 env[1201]: time="2025-09-06T00:29:46.255138053Z" level=info msg="TearDown network for sandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" successfully" Sep 6 00:29:46.270121 env[1201]: time="2025-09-06T00:29:46.270010530Z" level=info msg="RemovePodSandbox \"b64fd474ad94bbc39c1eecf2ecc67caf65f4d624700504ef46615ae38b40994f\" returns successfully" Sep 6 00:29:46.277548 env[1201]: time="2025-09-06T00:29:46.271732708Z" level=info msg="StopPodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\"" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.434 [WARNING][4120] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4", Pod:"coredns-674b8bbfcf-qp2t8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali209146bdc1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.434 [INFO][4120] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.434 [INFO][4120] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" iface="eth0" netns="" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.434 [INFO][4120] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.434 [INFO][4120] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.522 [INFO][4127] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.523 [INFO][4127] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.523 [INFO][4127] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.569 [WARNING][4127] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.570 [INFO][4127] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.579 [INFO][4127] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:46.588397 env[1201]: 2025-09-06 00:29:46.581 [INFO][4120] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.589714 env[1201]: time="2025-09-06T00:29:46.589648929Z" level=info msg="TearDown network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" successfully" Sep 6 00:29:46.589851 env[1201]: time="2025-09-06T00:29:46.589818174Z" level=info msg="StopPodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" returns successfully" Sep 6 00:29:46.590721 env[1201]: time="2025-09-06T00:29:46.590686717Z" level=info msg="RemovePodSandbox for \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\"" Sep 6 00:29:46.591488 env[1201]: time="2025-09-06T00:29:46.591422208Z" level=info msg="Forcibly stopping sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\"" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.736 [WARNING][4141] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ebb6ddae-38b0-4a28-8585-540bfa2e4cf4", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"b1eb682df7bff4dbc8a68eed8e322fadf1b61ff57685b4189c46816be614ebb4", Pod:"coredns-674b8bbfcf-qp2t8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali209146bdc1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.737 [INFO][4141] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.737 [INFO][4141] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" iface="eth0" netns="" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.737 [INFO][4141] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.737 [INFO][4141] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.796 [INFO][4148] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.796 [INFO][4148] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.797 [INFO][4148] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.808 [WARNING][4148] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.808 [INFO][4148] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" HandleID="k8s-pod-network.0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qp2t8-eth0" Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.812 [INFO][4148] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:46.821500 env[1201]: 2025-09-06 00:29:46.818 [INFO][4141] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135" Sep 6 00:29:46.822740 env[1201]: time="2025-09-06T00:29:46.822675794Z" level=info msg="TearDown network for sandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" successfully" Sep 6 00:29:46.839339 env[1201]: time="2025-09-06T00:29:46.839128302Z" level=info msg="RemovePodSandbox \"0fd8204d45172616f06be990be4dbce80589eedb88f18035cba943dcd8558135\" returns successfully" Sep 6 00:29:47.382000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:47.382000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002230a80 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:29:47.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:29:47.383000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:47.383000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002230aa0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:29:47.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:29:47.383000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:47.383000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002230ae0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:29:47.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:29:47.386000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:29:47.386000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021d5480 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:29:47.386000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:29:48.820215 env[1201]: time="2025-09-06T00:29:48.820141190Z" level=info msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.050 [INFO][4164] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.050 [INFO][4164] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" iface="eth0" netns="/var/run/netns/cni-dd1809ee-12ca-b106-8340-39cc80f56eea" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.051 [INFO][4164] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" iface="eth0" netns="/var/run/netns/cni-dd1809ee-12ca-b106-8340-39cc80f56eea" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.051 [INFO][4164] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" iface="eth0" netns="/var/run/netns/cni-dd1809ee-12ca-b106-8340-39cc80f56eea" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.051 [INFO][4164] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.051 [INFO][4164] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.147 [INFO][4171] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.147 [INFO][4171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.147 [INFO][4171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.163 [WARNING][4171] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.163 [INFO][4171] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.169 [INFO][4171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:49.175777 env[1201]: 2025-09-06 00:29:49.173 [INFO][4164] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:29:49.193482 env[1201]: time="2025-09-06T00:29:49.181564257Z" level=info msg="TearDown network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" successfully" Sep 6 00:29:49.193482 env[1201]: time="2025-09-06T00:29:49.181631982Z" level=info msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" returns successfully" Sep 6 00:29:49.193482 env[1201]: time="2025-09-06T00:29:49.183255451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-s2f4g,Uid:14c664da-0dcf-4e43-ad38-6dfc23481a33,Namespace:calico-apiserver,Attempt:1,}" Sep 6 00:29:49.182130 systemd[1]: run-netns-cni\x2ddd1809ee\x2d12ca\x2db106\x2d8340\x2d39cc80f56eea.mount: Deactivated successfully. Sep 6 00:29:49.570855 systemd-networkd[1025]: calie5df4e13219: Link UP Sep 6 00:29:49.576075 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:29:49.576276 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5df4e13219: link becomes ready Sep 6 00:29:49.576517 systemd-networkd[1025]: calie5df4e13219: Gained carrier Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.318 [INFO][4178] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0 calico-apiserver-78f697856d- calico-apiserver 14c664da-0dcf-4e43-ad38-6dfc23481a33 993 0 2025-09-06 00:29:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78f697856d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com calico-apiserver-78f697856d-s2f4g eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie5df4e13219 [] [] }} ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.318 [INFO][4178] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.426 [INFO][4191] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" HandleID="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.426 [INFO][4191] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" HandleID="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9720), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-vva2b.gb1.brightbox.com", "pod":"calico-apiserver-78f697856d-s2f4g", "timestamp":"2025-09-06 00:29:49.42660937 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.426 [INFO][4191] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.427 [INFO][4191] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.427 [INFO][4191] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.447 [INFO][4191] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.499 [INFO][4191] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.512 [INFO][4191] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.518 [INFO][4191] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.524 [INFO][4191] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.524 [INFO][4191] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.527 [INFO][4191] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.538 [INFO][4191] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.552 [INFO][4191] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.5/26] block=192.168.76.0/26 handle="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.552 [INFO][4191] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.5/26] handle="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.552 [INFO][4191] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:49.607202 env[1201]: 2025-09-06 00:29:49.552 [INFO][4191] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.5/26] IPv6=[] ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" HandleID="k8s-pod-network.4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.608934 env[1201]: 2025-09-06 00:29:49.556 [INFO][4178] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"14c664da-0dcf-4e43-ad38-6dfc23481a33", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-78f697856d-s2f4g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5df4e13219", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:49.608934 env[1201]: 2025-09-06 00:29:49.556 [INFO][4178] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.5/32] ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.608934 env[1201]: 2025-09-06 00:29:49.556 [INFO][4178] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie5df4e13219 ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.608934 env[1201]: 2025-09-06 00:29:49.577 [INFO][4178] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.608934 env[1201]: 2025-09-06 00:29:49.578 [INFO][4178] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"14c664da-0dcf-4e43-ad38-6dfc23481a33", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e", Pod:"calico-apiserver-78f697856d-s2f4g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5df4e13219", MAC:"da:bf:57:65:0b:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:49.608934 env[1201]: 2025-09-06 00:29:49.594 [INFO][4178] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e" Namespace="calico-apiserver" Pod="calico-apiserver-78f697856d-s2f4g" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:29:49.676000 audit[4213]: NETFILTER_CFG table=filter:109 family=2 entries=55 op=nft_register_chain pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:49.679892 kernel: kauditd_printk_skb: 638 callbacks suppressed Sep 6 00:29:49.680004 kernel: audit: type=1325 audit(1757118589.676:1226): table=filter:109 family=2 entries=55 op=nft_register_chain pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:49.676000 audit[4213]: SYSCALL arch=c000003e syscall=46 success=yes exit=28304 a0=3 a1=7fff31c935d0 a2=0 a3=7fff31c935bc items=0 ppid=3523 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.695386 kernel: audit: type=1300 audit(1757118589.676:1226): arch=c000003e syscall=46 success=yes exit=28304 a0=3 a1=7fff31c935d0 a2=0 a3=7fff31c935bc items=0 ppid=3523 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.695579 kernel: audit: type=1327 audit(1757118589.676:1226): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:49.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:49.699499 env[1201]: time="2025-09-06T00:29:49.699363125Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:49.700206 env[1201]: time="2025-09-06T00:29:49.699760473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:49.700206 env[1201]: time="2025-09-06T00:29:49.699837322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:49.703443 env[1201]: time="2025-09-06T00:29:49.702754753Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e pid=4216 runtime=io.containerd.runc.v2 Sep 6 00:29:49.779745 systemd[1]: Started cri-containerd-4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e.scope. Sep 6 00:29:49.931949 kernel: audit: type=1400 audit(1757118589.891:1227): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.936776 kernel: audit: type=1400 audit(1757118589.891:1228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.937227 kernel: audit: type=1400 audit(1757118589.891:1229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.937317 kernel: audit: type=1400 audit(1757118589.891:1230): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982213 kernel: audit: type=1400 audit(1757118589.891:1231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.995438 kernel: audit: type=1400 audit(1757118589.891:1232): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:50.001268 kernel: audit: type=1400 audit(1757118589.891:1233): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.926000 audit: BPF prog-id=184 op=LOAD Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4216 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383038326130383933643635653532663665646266376261613936 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4216 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383038326130383933643635653532663665646266376261613936 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.940000 audit: BPF prog-id=185 op=LOAD Sep 6 00:29:49.940000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000244d90 items=0 ppid=4216 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383038326130383933643635653532663665646266376261613936 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.980000 audit: BPF prog-id=186 op=LOAD Sep 6 00:29:49.980000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0001539c8 items=0 ppid=4216 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383038326130383933643635653532663665646266376261613936 Sep 6 00:29:49.982000 audit: BPF prog-id=186 op=UNLOAD Sep 6 00:29:49.982000 audit: BPF prog-id=185 op=UNLOAD Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:49.982000 audit: BPF prog-id=187 op=LOAD Sep 6 00:29:49.982000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000153dd8 items=0 ppid=4216 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:49.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461383038326130383933643635653532663665646266376261613936 Sep 6 00:29:50.109355 env[1201]: time="2025-09-06T00:29:50.109242736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78f697856d-s2f4g,Uid:14c664da-0dcf-4e43-ad38-6dfc23481a33,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e\"" Sep 6 00:29:50.135439 env[1201]: time="2025-09-06T00:29:50.134942130Z" level=info msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" Sep 6 00:29:50.148300 env[1201]: time="2025-09-06T00:29:50.147602956Z" level=info msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" Sep 6 00:29:50.180014 systemd[1]: run-containerd-runc-k8s.io-4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e-runc.T0wKLk.mount: Deactivated successfully. Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.471 [INFO][4282] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.471 [INFO][4282] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" iface="eth0" netns="/var/run/netns/cni-58aa1122-fb4d-4875-fcf4-afeacd32b2ef" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.471 [INFO][4282] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" iface="eth0" netns="/var/run/netns/cni-58aa1122-fb4d-4875-fcf4-afeacd32b2ef" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.472 [INFO][4282] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" iface="eth0" netns="/var/run/netns/cni-58aa1122-fb4d-4875-fcf4-afeacd32b2ef" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.472 [INFO][4282] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.472 [INFO][4282] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.538 [INFO][4294] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.538 [INFO][4294] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.538 [INFO][4294] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.564 [WARNING][4294] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.564 [INFO][4294] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.578 [INFO][4294] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:50.589276 env[1201]: 2025-09-06 00:29:50.584 [INFO][4282] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:29:50.593949 systemd[1]: run-netns-cni\x2d58aa1122\x2dfb4d\x2d4875\x2dfcf4\x2dafeacd32b2ef.mount: Deactivated successfully. Sep 6 00:29:50.598615 env[1201]: time="2025-09-06T00:29:50.596300790Z" level=info msg="TearDown network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" successfully" Sep 6 00:29:50.598615 env[1201]: time="2025-09-06T00:29:50.596369628Z" level=info msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" returns successfully" Sep 6 00:29:50.606856 env[1201]: time="2025-09-06T00:29:50.606788823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttshf,Uid:1debf633-9211-4db0-9299-eca2c0eba673,Namespace:calico-system,Attempt:1,}" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.470 [INFO][4277] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.470 [INFO][4277] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" iface="eth0" netns="/var/run/netns/cni-ea61b92c-7b37-4572-d685-38b83952a284" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.474 [INFO][4277] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" iface="eth0" netns="/var/run/netns/cni-ea61b92c-7b37-4572-d685-38b83952a284" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.474 [INFO][4277] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" iface="eth0" netns="/var/run/netns/cni-ea61b92c-7b37-4572-d685-38b83952a284" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.474 [INFO][4277] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.474 [INFO][4277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.567 [INFO][4295] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.567 [INFO][4295] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.578 [INFO][4295] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.596 [WARNING][4295] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.597 [INFO][4295] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.601 [INFO][4295] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:50.609656 env[1201]: 2025-09-06 00:29:50.604 [INFO][4277] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:29:50.613825 systemd[1]: run-netns-cni\x2dea61b92c\x2d7b37\x2d4572\x2dd685\x2d38b83952a284.mount: Deactivated successfully. Sep 6 00:29:50.625592 env[1201]: time="2025-09-06T00:29:50.625500196Z" level=info msg="TearDown network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" successfully" Sep 6 00:29:50.625972 env[1201]: time="2025-09-06T00:29:50.625892493Z" level=info msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" returns successfully" Sep 6 00:29:50.627348 env[1201]: time="2025-09-06T00:29:50.627276994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d8dfc7c5-r7brn,Uid:a76dcbff-37b9-4dc5-8732-1cbee8470613,Namespace:calico-system,Attempt:1,}" Sep 6 00:29:50.702700 systemd-networkd[1025]: calie5df4e13219: Gained IPv6LL Sep 6 00:29:50.929258 env[1201]: time="2025-09-06T00:29:50.927370320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:50.954495 env[1201]: time="2025-09-06T00:29:50.954429139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:50.967972 env[1201]: time="2025-09-06T00:29:50.967614176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:50.969533 env[1201]: time="2025-09-06T00:29:50.969489127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:50.977581 env[1201]: time="2025-09-06T00:29:50.975925946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 6 00:29:51.063560 env[1201]: time="2025-09-06T00:29:51.062690158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 6 00:29:51.086230 systemd-networkd[1025]: cali9a3d65db0ca: Link UP Sep 6 00:29:51.093758 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 00:29:51.093989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9a3d65db0ca: link becomes ready Sep 6 00:29:51.094341 systemd-networkd[1025]: cali9a3d65db0ca: Gained carrier Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.847 [INFO][4314] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0 csi-node-driver- calico-system 1debf633-9211-4db0-9299-eca2c0eba673 1004 0 2025-09-06 00:29:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com csi-node-driver-ttshf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9a3d65db0ca [] [] }} ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.847 [INFO][4314] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.922 [INFO][4333] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" HandleID="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.923 [INFO][4333] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" HandleID="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd710), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-vva2b.gb1.brightbox.com", "pod":"csi-node-driver-ttshf", "timestamp":"2025-09-06 00:29:50.921959977 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.923 [INFO][4333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.923 [INFO][4333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.923 [INFO][4333] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.951 [INFO][4333] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.974 [INFO][4333] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:50.994 [INFO][4333] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.006 [INFO][4333] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.013 [INFO][4333] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.013 [INFO][4333] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.018 [INFO][4333] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186 Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.040 [INFO][4333] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.060 [INFO][4333] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.6/26] block=192.168.76.0/26 handle="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.060 [INFO][4333] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.6/26] handle="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.060 [INFO][4333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:51.144171 env[1201]: 2025-09-06 00:29:51.062 [INFO][4333] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.6/26] IPv6=[] ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" HandleID="k8s-pod-network.5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.148021 env[1201]: 2025-09-06 00:29:51.067 [INFO][4314] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1debf633-9211-4db0-9299-eca2c0eba673", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-ttshf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a3d65db0ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:51.148021 env[1201]: 2025-09-06 00:29:51.067 [INFO][4314] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.6/32] ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.148021 env[1201]: 2025-09-06 00:29:51.067 [INFO][4314] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9a3d65db0ca ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.148021 env[1201]: 2025-09-06 00:29:51.101 [INFO][4314] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.148021 env[1201]: 2025-09-06 00:29:51.102 [INFO][4314] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1debf633-9211-4db0-9299-eca2c0eba673", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186", Pod:"csi-node-driver-ttshf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a3d65db0ca", MAC:"16:ae:96:cf:cc:34", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:51.148021 env[1201]: 2025-09-06 00:29:51.140 [INFO][4314] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186" Namespace="calico-system" Pod="csi-node-driver-ttshf" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:29:51.209311 env[1201]: time="2025-09-06T00:29:51.206331402Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:51.209311 env[1201]: time="2025-09-06T00:29:51.206397830Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:51.209311 env[1201]: time="2025-09-06T00:29:51.206417362Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:51.212177 env[1201]: time="2025-09-06T00:29:51.209910953Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186 pid=4359 runtime=io.containerd.runc.v2 Sep 6 00:29:51.227995 env[1201]: time="2025-09-06T00:29:51.227934620Z" level=info msg="CreateContainer within sandbox \"c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 6 00:29:51.234000 audit[4371]: NETFILTER_CFG table=filter:110 family=2 entries=48 op=nft_register_chain pid=4371 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:51.234000 audit[4371]: SYSCALL arch=c000003e syscall=46 success=yes exit=23124 a0=3 a1=7fff69fe14b0 a2=0 a3=7fff69fe149c items=0 ppid=3523 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.234000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:51.269541 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount715204081.mount: Deactivated successfully. Sep 6 00:29:51.279578 systemd-networkd[1025]: cali72c0008f209: Link UP Sep 6 00:29:51.281273 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali72c0008f209: link becomes ready Sep 6 00:29:51.282458 systemd-networkd[1025]: cali72c0008f209: Gained carrier Sep 6 00:29:51.312227 systemd[1]: Started cri-containerd-5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186.scope. Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:50.841 [INFO][4306] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0 calico-kube-controllers-5d8dfc7c5- calico-system a76dcbff-37b9-4dc5-8732-1cbee8470613 1003 0 2025-09-06 00:29:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5d8dfc7c5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com calico-kube-controllers-5d8dfc7c5-r7brn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali72c0008f209 [] [] }} ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:50.844 [INFO][4306] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:50.989 [INFO][4334] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" HandleID="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:50.989 [INFO][4334] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" HandleID="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-vva2b.gb1.brightbox.com", "pod":"calico-kube-controllers-5d8dfc7c5-r7brn", "timestamp":"2025-09-06 00:29:50.989029836 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:50.989 [INFO][4334] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.060 [INFO][4334] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.061 [INFO][4334] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.111 [INFO][4334] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.167 [INFO][4334] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.190 [INFO][4334] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.194 [INFO][4334] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.203 [INFO][4334] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.203 [INFO][4334] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.208 [INFO][4334] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463 Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.241 [INFO][4334] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.255 [INFO][4334] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.7/26] block=192.168.76.0/26 handle="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.255 [INFO][4334] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.7/26] handle="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.255 [INFO][4334] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:51.332558 env[1201]: 2025-09-06 00:29:51.255 [INFO][4334] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.7/26] IPv6=[] ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" HandleID="k8s-pod-network.4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.333980 env[1201]: 2025-09-06 00:29:51.270 [INFO][4306] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0", GenerateName:"calico-kube-controllers-5d8dfc7c5-", Namespace:"calico-system", SelfLink:"", UID:"a76dcbff-37b9-4dc5-8732-1cbee8470613", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d8dfc7c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-5d8dfc7c5-r7brn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c0008f209", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:51.333980 env[1201]: 2025-09-06 00:29:51.271 [INFO][4306] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.7/32] ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.333980 env[1201]: 2025-09-06 00:29:51.271 [INFO][4306] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali72c0008f209 ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.333980 env[1201]: 2025-09-06 00:29:51.283 [INFO][4306] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.333980 env[1201]: 2025-09-06 00:29:51.284 [INFO][4306] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0", GenerateName:"calico-kube-controllers-5d8dfc7c5-", Namespace:"calico-system", SelfLink:"", UID:"a76dcbff-37b9-4dc5-8732-1cbee8470613", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d8dfc7c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463", Pod:"calico-kube-controllers-5d8dfc7c5-r7brn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c0008f209", MAC:"ae:3a:db:5d:24:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:51.333980 env[1201]: 2025-09-06 00:29:51.310 [INFO][4306] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463" Namespace="calico-system" Pod="calico-kube-controllers-5d8dfc7c5-r7brn" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:29:51.362594 env[1201]: time="2025-09-06T00:29:51.362501160Z" level=info msg="CreateContainer within sandbox \"c3436b6a69809471bb9ffda3dd601bca9664d9a85566a64b214a7c373b110c47\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d6a19cd622c8fb8ae2de6b5b7b91bb6edce31a643c08ce796bc72004cb57a479\"" Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.361000 audit: BPF prog-id=188 op=LOAD Sep 6 00:29:51.364000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.364000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333563656332346264373735306462383366353032633732323730 Sep 6 00:29:51.364000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.364000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.366906 env[1201]: time="2025-09-06T00:29:51.366835401Z" level=info msg="StartContainer for \"d6a19cd622c8fb8ae2de6b5b7b91bb6edce31a643c08ce796bc72004cb57a479\"" Sep 6 00:29:51.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333563656332346264373735306462383366353032633732323730 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.369000 audit: BPF prog-id=189 op=LOAD Sep 6 00:29:51.369000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002108d0 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333563656332346264373735306462383366353032633732323730 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.371000 audit: BPF prog-id=190 op=LOAD Sep 6 00:29:51.371000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000210918 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333563656332346264373735306462383366353032633732323730 Sep 6 00:29:51.373000 audit: BPF prog-id=190 op=UNLOAD Sep 6 00:29:51.373000 audit: BPF prog-id=189 op=UNLOAD Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.374000 audit: BPF prog-id=191 op=LOAD Sep 6 00:29:51.374000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000210d28 items=0 ppid=4359 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333563656332346264373735306462383366353032633732323730 Sep 6 00:29:51.376000 audit[4398]: NETFILTER_CFG table=filter:111 family=2 entries=52 op=nft_register_chain pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:51.376000 audit[4398]: SYSCALL arch=c000003e syscall=46 success=yes exit=24312 a0=3 a1=7fff8f7206b0 a2=0 a3=7fff8f72069c items=0 ppid=3523 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.376000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:51.429354 env[1201]: time="2025-09-06T00:29:51.429292227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ttshf,Uid:1debf633-9211-4db0-9299-eca2c0eba673,Namespace:calico-system,Attempt:1,} returns sandbox id \"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186\"" Sep 6 00:29:51.455231 env[1201]: time="2025-09-06T00:29:51.454516599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:51.455231 env[1201]: time="2025-09-06T00:29:51.454605609Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:51.455231 env[1201]: time="2025-09-06T00:29:51.454632742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:51.455231 env[1201]: time="2025-09-06T00:29:51.455004842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463 pid=4414 runtime=io.containerd.runc.v2 Sep 6 00:29:51.464127 systemd[1]: Started cri-containerd-d6a19cd622c8fb8ae2de6b5b7b91bb6edce31a643c08ce796bc72004cb57a479.scope. Sep 6 00:29:51.507036 systemd[1]: Started cri-containerd-4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463.scope. Sep 6 00:29:51.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.530000 audit: BPF prog-id=192 op=LOAD Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3759 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613139636436323263386662386165326465366235623762393162 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3759 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613139636436323263386662386165326465366235623762393162 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit: BPF prog-id=193 op=LOAD Sep 6 00:29:51.531000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025290 items=0 ppid=3759 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613139636436323263386662386165326465366235623762393162 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.531000 audit: BPF prog-id=194 op=LOAD Sep 6 00:29:51.531000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000252d8 items=0 ppid=3759 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613139636436323263386662386165326465366235623762393162 Sep 6 00:29:51.531000 audit: BPF prog-id=194 op=UNLOAD Sep 6 00:29:51.532000 audit: BPF prog-id=193 op=UNLOAD Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.532000 audit: BPF prog-id=195 op=LOAD Sep 6 00:29:51.532000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000256e8 items=0 ppid=3759 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613139636436323263386662386165326465366235623762393162 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.564000 audit: BPF prog-id=196 op=LOAD Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4414 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462316164383132346434316362656639623432643335613866623865 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4414 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462316164383132346434316362656639623432643335613866623865 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.565000 audit: BPF prog-id=197 op=LOAD Sep 6 00:29:51.565000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000382b40 items=0 ppid=4414 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462316164383132346434316362656639623432643335613866623865 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit: BPF prog-id=198 op=LOAD Sep 6 00:29:51.566000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000382b88 items=0 ppid=4414 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462316164383132346434316362656639623432643335613866623865 Sep 6 00:29:51.566000 audit: BPF prog-id=198 op=UNLOAD Sep 6 00:29:51.566000 audit: BPF prog-id=197 op=UNLOAD Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { perfmon } for pid=4437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit[4437]: AVC avc: denied { bpf } for pid=4437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:51.566000 audit: BPF prog-id=199 op=LOAD Sep 6 00:29:51.566000 audit[4437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000382f98 items=0 ppid=4414 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:51.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462316164383132346434316362656639623432643335613866623865 Sep 6 00:29:51.632565 env[1201]: time="2025-09-06T00:29:51.632482085Z" level=info msg="StartContainer for \"d6a19cd622c8fb8ae2de6b5b7b91bb6edce31a643c08ce796bc72004cb57a479\" returns successfully" Sep 6 00:29:51.673121 env[1201]: time="2025-09-06T00:29:51.673013251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5d8dfc7c5-r7brn,Uid:a76dcbff-37b9-4dc5-8732-1cbee8470613,Namespace:calico-system,Attempt:1,} returns sandbox id \"4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463\"" Sep 6 00:29:52.170337 systemd-networkd[1025]: cali9a3d65db0ca: Gained IPv6LL Sep 6 00:29:52.182158 systemd[1]: run-containerd-runc-k8s.io-5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186-runc.Ncw7uO.mount: Deactivated successfully. Sep 6 00:29:52.617000 audit[4484]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:52.617000 audit[4484]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffef1966410 a2=0 a3=7ffef19663fc items=0 ppid=2136 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:52.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:52.623000 audit[4484]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:52.623000 audit[4484]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffef1966410 a2=0 a3=7ffef19663fc items=0 ppid=2136 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:52.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:53.066628 systemd-networkd[1025]: cali72c0008f209: Gained IPv6LL Sep 6 00:29:53.142651 env[1201]: time="2025-09-06T00:29:53.142547900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:53.147102 env[1201]: time="2025-09-06T00:29:53.146979686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:53.157854 env[1201]: time="2025-09-06T00:29:53.157775557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:53.162348 env[1201]: time="2025-09-06T00:29:53.162277608Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:53.163160 env[1201]: time="2025-09-06T00:29:53.163105471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 6 00:29:53.170338 env[1201]: time="2025-09-06T00:29:53.170275764Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 6 00:29:53.181869 env[1201]: time="2025-09-06T00:29:53.181782032Z" level=info msg="CreateContainer within sandbox \"a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 6 00:29:53.220961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3210204482.mount: Deactivated successfully. Sep 6 00:29:53.233363 env[1201]: time="2025-09-06T00:29:53.233245817Z" level=info msg="CreateContainer within sandbox \"a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"9a76cab66baaec81db3dec20af85feb3f6a5d4fc4eb89ffec131784223509eed\"" Sep 6 00:29:53.235009 env[1201]: time="2025-09-06T00:29:53.234973071Z" level=info msg="StartContainer for \"9a76cab66baaec81db3dec20af85feb3f6a5d4fc4eb89ffec131784223509eed\"" Sep 6 00:29:53.308016 systemd[1]: Started cri-containerd-9a76cab66baaec81db3dec20af85feb3f6a5d4fc4eb89ffec131784223509eed.scope. Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.386000 audit: BPF prog-id=200 op=LOAD Sep 6 00:29:53.386000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.386000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3724 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:53.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373663616236366261616563383164623364656332306166383566 Sep 6 00:29:53.386000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.386000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3724 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:53.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373663616236366261616563383164623364656332306166383566 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.388000 audit: BPF prog-id=201 op=LOAD Sep 6 00:29:53.388000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d6000 items=0 ppid=3724 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:53.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373663616236366261616563383164623364656332306166383566 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.389000 audit: BPF prog-id=202 op=LOAD Sep 6 00:29:53.389000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d6048 items=0 ppid=3724 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:53.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373663616236366261616563383164623364656332306166383566 Sep 6 00:29:53.390000 audit: BPF prog-id=202 op=UNLOAD Sep 6 00:29:53.390000 audit: BPF prog-id=201 op=UNLOAD Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { perfmon } for pid=4492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit[4492]: AVC avc: denied { bpf } for pid=4492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:53.390000 audit: BPF prog-id=203 op=LOAD Sep 6 00:29:53.390000 audit[4492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d6458 items=0 ppid=3724 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:53.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961373663616236366261616563383164623364656332306166383566 Sep 6 00:29:53.506323 env[1201]: time="2025-09-06T00:29:53.506243845Z" level=info msg="StartContainer for \"9a76cab66baaec81db3dec20af85feb3f6a5d4fc4eb89ffec131784223509eed\" returns successfully" Sep 6 00:29:53.574675 kubelet[2027]: I0906 00:29:53.574580 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 00:29:53.597000 audit[4503]: AVC avc: denied { search } for pid=4503 comm="nginx" name="crypto" dev="proc" ino=33933 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c621 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 00:29:53.597000 audit[4503]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbcb5f82728 a2=0 a3=0 items=0 ppid=3724 pid=4503 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c621 key=(null) Sep 6 00:29:53.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 6 00:29:54.212932 systemd[1]: run-containerd-runc-k8s.io-9a76cab66baaec81db3dec20af85feb3f6a5d4fc4eb89ffec131784223509eed-runc.RN4awX.mount: Deactivated successfully. Sep 6 00:29:54.329000 audit[4447]: AVC avc: denied { watch } for pid=4447 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.1777534731/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c355,c644 tclass=file permissive=0 Sep 6 00:29:54.329000 audit[4447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00045aac0 a2=fc6 a3=0 items=0 ppid=3759 pid=4447 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 key=(null) Sep 6 00:29:54.329000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:29:54.891628 env[1201]: time="2025-09-06T00:29:54.891557013Z" level=info msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" Sep 6 00:29:55.328741 kubelet[2027]: I0906 00:29:55.310322 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78f697856d-r5dpj" podStartSLOduration=45.839552653 podStartE2EDuration="53.295524325s" podCreationTimestamp="2025-09-06 00:29:02 +0000 UTC" firstStartedPulling="2025-09-06 00:29:43.599912543 +0000 UTC m=+59.099859281" lastFinishedPulling="2025-09-06 00:29:51.055884208 +0000 UTC m=+66.555830953" observedRunningTime="2025-09-06 00:29:52.571233387 +0000 UTC m=+68.071180136" watchObservedRunningTime="2025-09-06 00:29:55.295524325 +0000 UTC m=+70.795471070" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.260 [INFO][4537] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.260 [INFO][4537] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" iface="eth0" netns="/var/run/netns/cni-518d7029-3381-4d27-0bd1-53293ab0b7a9" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.261 [INFO][4537] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" iface="eth0" netns="/var/run/netns/cni-518d7029-3381-4d27-0bd1-53293ab0b7a9" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.261 [INFO][4537] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" iface="eth0" netns="/var/run/netns/cni-518d7029-3381-4d27-0bd1-53293ab0b7a9" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.261 [INFO][4537] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.261 [INFO][4537] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.403 [INFO][4544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.404 [INFO][4544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.405 [INFO][4544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.428 [WARNING][4544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.428 [INFO][4544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.434 [INFO][4544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:55.457974 env[1201]: 2025-09-06 00:29:55.443 [INFO][4537] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:29:55.464948 systemd[1]: run-netns-cni\x2d518d7029\x2d3381\x2d4d27\x2d0bd1\x2d53293ab0b7a9.mount: Deactivated successfully. Sep 6 00:29:55.472634 env[1201]: time="2025-09-06T00:29:55.471836513Z" level=info msg="TearDown network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" successfully" Sep 6 00:29:55.472634 env[1201]: time="2025-09-06T00:29:55.471916343Z" level=info msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" returns successfully" Sep 6 00:29:55.479565 env[1201]: time="2025-09-06T00:29:55.479498167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-d5w6h,Uid:ad7d0935-9a1f-48ec-af2b-9a3b763c9e06,Namespace:kube-system,Attempt:1,}" Sep 6 00:29:55.945557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib1799085109: link becomes ready Sep 6 00:29:55.952610 systemd-networkd[1025]: calib1799085109: Link UP Sep 6 00:29:55.956292 systemd-networkd[1025]: calib1799085109: Gained carrier Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.674 [INFO][4550] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0 coredns-674b8bbfcf- kube-system ad7d0935-9a1f-48ec-af2b-9a3b763c9e06 1032 0 2025-09-06 00:28:49 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-vva2b.gb1.brightbox.com coredns-674b8bbfcf-d5w6h eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib1799085109 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.674 [INFO][4550] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.759 [INFO][4563] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" HandleID="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.759 [INFO][4563] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" HandleID="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b610), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-vva2b.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-d5w6h", "timestamp":"2025-09-06 00:29:55.759588111 +0000 UTC"}, Hostname:"srv-vva2b.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.760 [INFO][4563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.760 [INFO][4563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.760 [INFO][4563] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-vva2b.gb1.brightbox.com' Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.783 [INFO][4563] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.814 [INFO][4563] ipam/ipam.go 394: Looking up existing affinities for host host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.827 [INFO][4563] ipam/ipam.go 511: Trying affinity for 192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.833 [INFO][4563] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.847 [INFO][4563] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.0/26 host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.851 [INFO][4563] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.0/26 handle="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.857 [INFO][4563] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.868 [INFO][4563] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.0/26 handle="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.891 [INFO][4563] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.8/26] block=192.168.76.0/26 handle="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.892 [INFO][4563] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.8/26] handle="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" host="srv-vva2b.gb1.brightbox.com" Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.892 [INFO][4563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:29:56.025066 env[1201]: 2025-09-06 00:29:55.892 [INFO][4563] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.8/26] IPv6=[] ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" HandleID="k8s-pod-network.20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.033815 env[1201]: 2025-09-06 00:29:55.915 [INFO][4550] cni-plugin/k8s.go 418: Populated endpoint ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-d5w6h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib1799085109", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:56.033815 env[1201]: 2025-09-06 00:29:55.915 [INFO][4550] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.8/32] ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.033815 env[1201]: 2025-09-06 00:29:55.915 [INFO][4550] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib1799085109 ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.033815 env[1201]: 2025-09-06 00:29:55.947 [INFO][4550] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.033815 env[1201]: 2025-09-06 00:29:55.953 [INFO][4550] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da", Pod:"coredns-674b8bbfcf-d5w6h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib1799085109", MAC:"fe:50:ab:be:4b:79", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:29:56.033815 env[1201]: 2025-09-06 00:29:56.013 [INFO][4550] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da" Namespace="kube-system" Pod="coredns-674b8bbfcf-d5w6h" WorkloadEndpoint="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:29:56.133631 env[1201]: time="2025-09-06T00:29:56.133407731Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 00:29:56.133957 env[1201]: time="2025-09-06T00:29:56.133732217Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 00:29:56.133957 env[1201]: time="2025-09-06T00:29:56.133807175Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 00:29:56.135278 env[1201]: time="2025-09-06T00:29:56.135204811Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da pid=4584 runtime=io.containerd.runc.v2 Sep 6 00:29:56.250582 systemd[1]: Started cri-containerd-20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da.scope. Sep 6 00:29:56.278000 audit[4616]: NETFILTER_CFG table=filter:114 family=2 entries=52 op=nft_register_chain pid=4616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:56.282480 kernel: kauditd_printk_skb: 296 callbacks suppressed Sep 6 00:29:56.282596 kernel: audit: type=1325 audit(1757118596.278:1323): table=filter:114 family=2 entries=52 op=nft_register_chain pid=4616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 00:29:56.278000 audit[4616]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffe1f3dc840 a2=0 a3=7ffe1f3dc82c items=0 ppid=3523 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.297665 kernel: audit: type=1300 audit(1757118596.278:1323): arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffe1f3dc840 a2=0 a3=7ffe1f3dc82c items=0 ppid=3523 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.310361 kernel: audit: type=1327 audit(1757118596.278:1323): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:56.310715 kernel: audit: type=1400 audit(1757118596.279:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.310986 kernel: audit: type=1400 audit(1757118596.279:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.318045 kernel: audit: type=1400 audit(1757118596.279:1326): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.320917 kernel: audit: type=1400 audit(1757118596.279:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.329435 kernel: audit: type=1400 audit(1757118596.279:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.334699 kernel: audit: type=1400 audit(1757118596.279:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.347252 kernel: audit: type=1400 audit(1757118596.279:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.279000 audit: BPF prog-id=204 op=LOAD Sep 6 00:29:56.286000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.286000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4584 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653332306632346466333037393065333135623538323661326232 Sep 6 00:29:56.286000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.286000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4584 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653332306632346466333037393065333135623538323661326232 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.287000 audit: BPF prog-id=205 op=LOAD Sep 6 00:29:56.287000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000381450 items=0 ppid=4584 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653332306632346466333037393065333135623538323661326232 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.312000 audit: BPF prog-id=206 op=LOAD Sep 6 00:29:56.312000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000381498 items=0 ppid=4584 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653332306632346466333037393065333135623538323661326232 Sep 6 00:29:56.324000 audit: BPF prog-id=206 op=UNLOAD Sep 6 00:29:56.324000 audit: BPF prog-id=205 op=UNLOAD Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.324000 audit: BPF prog-id=207 op=LOAD Sep 6 00:29:56.324000 audit[4598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003818a8 items=0 ppid=4584 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230653332306632346466333037393065333135623538323661326232 Sep 6 00:29:56.434406 env[1201]: time="2025-09-06T00:29:56.434334326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-d5w6h,Uid:ad7d0935-9a1f-48ec-af2b-9a3b763c9e06,Namespace:kube-system,Attempt:1,} returns sandbox id \"20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da\"" Sep 6 00:29:56.463408 systemd[1]: run-containerd-runc-k8s.io-20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da-runc.0jawp5.mount: Deactivated successfully. Sep 6 00:29:56.493560 env[1201]: time="2025-09-06T00:29:56.493495902Z" level=info msg="CreateContainer within sandbox \"20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 6 00:29:56.518563 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1270561589.mount: Deactivated successfully. Sep 6 00:29:56.535011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1105099215.mount: Deactivated successfully. Sep 6 00:29:56.539763 env[1201]: time="2025-09-06T00:29:56.539641740Z" level=info msg="CreateContainer within sandbox \"20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1cd8d4ea551142571a8b1755aa26cf145be0c49ba724149723214f9006679883\"" Sep 6 00:29:56.543331 env[1201]: time="2025-09-06T00:29:56.541060962Z" level=info msg="StartContainer for \"1cd8d4ea551142571a8b1755aa26cf145be0c49ba724149723214f9006679883\"" Sep 6 00:29:56.572829 systemd[1]: Started cri-containerd-1cd8d4ea551142571a8b1755aa26cf145be0c49ba724149723214f9006679883.scope. Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.611000 audit: BPF prog-id=208 op=LOAD Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4584 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643864346561353531313432353731613862313735356161323663 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4584 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643864346561353531313432353731613862313735356161323663 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit: BPF prog-id=209 op=LOAD Sep 6 00:29:56.613000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bd030 items=0 ppid=4584 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643864346561353531313432353731613862313735356161323663 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.613000 audit: BPF prog-id=210 op=LOAD Sep 6 00:29:56.613000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bd078 items=0 ppid=4584 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643864346561353531313432353731613862313735356161323663 Sep 6 00:29:56.614000 audit: BPF prog-id=210 op=UNLOAD Sep 6 00:29:56.614000 audit: BPF prog-id=209 op=UNLOAD Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { perfmon } for pid=4630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit[4630]: AVC avc: denied { bpf } for pid=4630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:56.614000 audit: BPF prog-id=211 op=LOAD Sep 6 00:29:56.614000 audit[4630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bd488 items=0 ppid=4584 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:56.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643864346561353531313432353731613862313735356161323663 Sep 6 00:29:56.667115 env[1201]: time="2025-09-06T00:29:56.667027916Z" level=info msg="StartContainer for \"1cd8d4ea551142571a8b1755aa26cf145be0c49ba724149723214f9006679883\" returns successfully" Sep 6 00:29:56.823000 audit[4641]: AVC avc: denied { getattr } for pid=4641 comm="coredns" path="cgroup:[4026532907]" dev="nsfs" ino=4026532907 scontext=system_u:system_r:svirt_lxc_net_t:s0:c476,c554 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 6 00:29:56.823000 audit[4641]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a228 a2=c00012a928 a3=0 items=0 ppid=4584 pid=4641 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c476,c554 key=(null) Sep 6 00:29:56.823000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 6 00:29:57.656242 kubelet[2027]: I0906 00:29:57.656138 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-d5w6h" podStartSLOduration=68.656068694 podStartE2EDuration="1m8.656068694s" podCreationTimestamp="2025-09-06 00:28:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 00:29:57.653720342 +0000 UTC m=+73.153667089" watchObservedRunningTime="2025-09-06 00:29:57.656068694 +0000 UTC m=+73.156015435" Sep 6 00:29:57.738461 systemd-networkd[1025]: calib1799085109: Gained IPv6LL Sep 6 00:29:57.819000 audit[4660]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=4660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:57.819000 audit[4660]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe2ce0fd10 a2=0 a3=7ffe2ce0fcfc items=0 ppid=2136 pid=4660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:57.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:57.825000 audit[4660]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:57.825000 audit[4660]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe2ce0fd10 a2=0 a3=7ffe2ce0fcfc items=0 ppid=2136 pid=4660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:57.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:58.254687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3893422128.mount: Deactivated successfully. Sep 6 00:29:58.738000 audit[4662]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4662 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:58.738000 audit[4662]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff8df0a1d0 a2=0 a3=7fff8df0a1bc items=0 ppid=2136 pid=4662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:58.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:58.782000 audit[4662]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4662 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:29:58.782000 audit[4662]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff8df0a1d0 a2=0 a3=7fff8df0a1bc items=0 ppid=2136 pid=4662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:58.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:29:59.747000 env[1201]: time="2025-09-06T00:29:59.746866026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:59.750962 env[1201]: time="2025-09-06T00:29:59.750885796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:59.753375 env[1201]: time="2025-09-06T00:29:59.753323437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:59.757053 env[1201]: time="2025-09-06T00:29:59.757009990Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:29:59.757664 env[1201]: time="2025-09-06T00:29:59.757619785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 6 00:29:59.799762 env[1201]: time="2025-09-06T00:29:59.799705732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 6 00:29:59.810835 env[1201]: time="2025-09-06T00:29:59.810777909Z" level=info msg="CreateContainer within sandbox \"46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 6 00:29:59.870799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3379337001.mount: Deactivated successfully. Sep 6 00:29:59.874279 env[1201]: time="2025-09-06T00:29:59.874167594Z" level=info msg="CreateContainer within sandbox \"46af8f0cebe48e1147cadf60062c698703af6b108a2e8bac3ac6f62eaccb29fc\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"b4268f6e6b92addd096e1aa25964fc8e2f52fefc064a974f1c0f7b7ec2073acc\"" Sep 6 00:29:59.877820 env[1201]: time="2025-09-06T00:29:59.877500562Z" level=info msg="StartContainer for \"b4268f6e6b92addd096e1aa25964fc8e2f52fefc064a974f1c0f7b7ec2073acc\"" Sep 6 00:29:59.938955 systemd[1]: Started cri-containerd-b4268f6e6b92addd096e1aa25964fc8e2f52fefc064a974f1c0f7b7ec2073acc.scope. Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.987000 audit: BPF prog-id=212 op=LOAD Sep 6 00:29:59.988000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.988000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3808 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:59.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323638663665366239326164646430393665316161323539363466 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3808 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:59.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323638663665366239326164646430393665316161323539363466 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.989000 audit: BPF prog-id=213 op=LOAD Sep 6 00:29:59.989000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003528f0 items=0 ppid=3808 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:59.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323638663665366239326164646430393665316161323539363466 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.991000 audit: BPF prog-id=214 op=LOAD Sep 6 00:29:59.991000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000352938 items=0 ppid=3808 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:59.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323638663665366239326164646430393665316161323539363466 Sep 6 00:29:59.992000 audit: BPF prog-id=214 op=UNLOAD Sep 6 00:29:59.992000 audit: BPF prog-id=213 op=UNLOAD Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:29:59.992000 audit: BPF prog-id=215 op=LOAD Sep 6 00:29:59.992000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000352d48 items=0 ppid=3808 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:29:59.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323638663665366239326164646430393665316161323539363466 Sep 6 00:30:00.065919 env[1201]: time="2025-09-06T00:30:00.065804256Z" level=info msg="StartContainer for \"b4268f6e6b92addd096e1aa25964fc8e2f52fefc064a974f1c0f7b7ec2073acc\" returns successfully" Sep 6 00:30:00.170828 env[1201]: time="2025-09-06T00:30:00.170741419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:00.173998 env[1201]: time="2025-09-06T00:30:00.173947798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:00.176343 env[1201]: time="2025-09-06T00:30:00.176299876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:00.183445 env[1201]: time="2025-09-06T00:30:00.183164706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:00.185425 env[1201]: time="2025-09-06T00:30:00.183529260Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 6 00:30:00.194607 env[1201]: time="2025-09-06T00:30:00.193112174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 00:30:00.202498 env[1201]: time="2025-09-06T00:30:00.202441072Z" level=info msg="CreateContainer within sandbox \"4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 6 00:30:00.252583 env[1201]: time="2025-09-06T00:30:00.252414625Z" level=info msg="CreateContainer within sandbox \"4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d92b345ef8100f24eb5bf56a55ab299975ee80cfc1159fc4f8f74cdf01afb5fc\"" Sep 6 00:30:00.253958 env[1201]: time="2025-09-06T00:30:00.253865519Z" level=info msg="StartContainer for \"d92b345ef8100f24eb5bf56a55ab299975ee80cfc1159fc4f8f74cdf01afb5fc\"" Sep 6 00:30:00.311844 systemd[1]: Started cri-containerd-d92b345ef8100f24eb5bf56a55ab299975ee80cfc1159fc4f8f74cdf01afb5fc.scope. Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.352000 audit: BPF prog-id=216 op=LOAD Sep 6 00:30:00.354000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.354000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4216 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439326233343565663831303066323465623562663536613535616232 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4216 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439326233343565663831303066323465623562663536613535616232 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit: BPF prog-id=217 op=LOAD Sep 6 00:30:00.355000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c0010 items=0 ppid=4216 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439326233343565663831303066323465623562663536613535616232 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.355000 audit: BPF prog-id=218 op=LOAD Sep 6 00:30:00.355000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c0058 items=0 ppid=4216 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439326233343565663831303066323465623562663536613535616232 Sep 6 00:30:00.357000 audit: BPF prog-id=218 op=UNLOAD Sep 6 00:30:00.357000 audit: BPF prog-id=217 op=UNLOAD Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:00.357000 audit: BPF prog-id=219 op=LOAD Sep 6 00:30:00.357000 audit[4706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c0468 items=0 ppid=4216 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439326233343565663831303066323465623562663536613535616232 Sep 6 00:30:00.419414 env[1201]: time="2025-09-06T00:30:00.419337738Z" level=info msg="StartContainer for \"d92b345ef8100f24eb5bf56a55ab299975ee80cfc1159fc4f8f74cdf01afb5fc\" returns successfully" Sep 6 00:30:00.749000 audit[4744]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:00.749000 audit[4744]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeacfd2150 a2=0 a3=7ffeacfd213c items=0 ppid=2136 pid=4744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:00.758000 audit[4744]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:00.758000 audit[4744]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeacfd2150 a2=0 a3=7ffeacfd213c items=0 ppid=2136 pid=4744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:00.762145 kubelet[2027]: I0906 00:30:00.749414 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-54d579b49d-ffdth" podStartSLOduration=37.695010331 podStartE2EDuration="53.706249684s" podCreationTimestamp="2025-09-06 00:29:07 +0000 UTC" firstStartedPulling="2025-09-06 00:29:43.759152973 +0000 UTC m=+59.259099705" lastFinishedPulling="2025-09-06 00:29:59.770392317 +0000 UTC m=+75.270339058" observedRunningTime="2025-09-06 00:30:00.699633981 +0000 UTC m=+76.199580732" watchObservedRunningTime="2025-09-06 00:30:00.706249684 +0000 UTC m=+76.206196429" Sep 6 00:30:00.789591 kubelet[2027]: I0906 00:30:00.789475 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78f697856d-s2f4g" podStartSLOduration=48.89173169 podStartE2EDuration="58.789452616s" podCreationTimestamp="2025-09-06 00:29:02 +0000 UTC" firstStartedPulling="2025-09-06 00:29:50.294878901 +0000 UTC m=+65.794825638" lastFinishedPulling="2025-09-06 00:30:00.192599825 +0000 UTC m=+75.692546564" observedRunningTime="2025-09-06 00:30:00.785477589 +0000 UTC m=+76.285424339" watchObservedRunningTime="2025-09-06 00:30:00.789452616 +0000 UTC m=+76.289399361" Sep 6 00:30:00.832000 audit[4753]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:00.832000 audit[4753]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff85cea6f0 a2=0 a3=7fff85cea6dc items=0 ppid=2136 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:00.840000 audit[4753]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:00.840000 audit[4753]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff85cea6f0 a2=0 a3=7fff85cea6dc items=0 ppid=2136 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:00.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:01.716240 kubelet[2027]: I0906 00:30:01.716173 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 00:30:01.876000 audit[4768]: NETFILTER_CFG table=filter:123 family=2 entries=13 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:01.903803 kernel: kauditd_printk_skb: 248 callbacks suppressed Sep 6 00:30:01.907493 kernel: audit: type=1325 audit(1757118601.876:1405): table=filter:123 family=2 entries=13 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:01.910895 kernel: audit: type=1300 audit(1757118601.876:1405): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe8c84e6b0 a2=0 a3=7ffe8c84e69c items=0 ppid=2136 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:01.911254 kernel: audit: type=1327 audit(1757118601.876:1405): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:01.911654 kernel: audit: type=1325 audit(1757118601.907:1406): table=nat:124 family=2 entries=27 op=nft_register_chain pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:01.876000 audit[4768]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe8c84e6b0 a2=0 a3=7ffe8c84e69c items=0 ppid=2136 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:01.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:01.907000 audit[4768]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:01.907000 audit[4768]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe8c84e6b0 a2=0 a3=7ffe8c84e69c items=0 ppid=2136 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:01.923526 kernel: audit: type=1300 audit(1757118601.907:1406): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe8c84e6b0 a2=0 a3=7ffe8c84e69c items=0 ppid=2136 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:01.923745 kernel: audit: type=1327 audit(1757118601.907:1406): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:01.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:02.330653 env[1201]: time="2025-09-06T00:30:02.330441432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:02.342720 env[1201]: time="2025-09-06T00:30:02.342647452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:02.350700 env[1201]: time="2025-09-06T00:30:02.350629549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:02.359045 env[1201]: time="2025-09-06T00:30:02.358965816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:02.363571 env[1201]: time="2025-09-06T00:30:02.360279137Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 00:30:02.371292 env[1201]: time="2025-09-06T00:30:02.371209403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 6 00:30:02.411104 env[1201]: time="2025-09-06T00:30:02.411003052Z" level=info msg="CreateContainer within sandbox \"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 00:30:02.467626 env[1201]: time="2025-09-06T00:30:02.467539982Z" level=info msg="CreateContainer within sandbox \"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a92d06b5cc3a60648d98f6d971a5c0b02fd88178c7fc5676dfc4d4787b6bede3\"" Sep 6 00:30:02.469559 env[1201]: time="2025-09-06T00:30:02.469511026Z" level=info msg="StartContainer for \"a92d06b5cc3a60648d98f6d971a5c0b02fd88178c7fc5676dfc4d4787b6bede3\"" Sep 6 00:30:02.524369 systemd[1]: Started cri-containerd-a92d06b5cc3a60648d98f6d971a5c0b02fd88178c7fc5676dfc4d4787b6bede3.scope. Sep 6 00:30:02.550071 systemd[1]: run-containerd-runc-k8s.io-a92d06b5cc3a60648d98f6d971a5c0b02fd88178c7fc5676dfc4d4787b6bede3-runc.muKCpM.mount: Deactivated successfully. Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.629122 kernel: audit: type=1400 audit(1757118602.622:1407): avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.629597 kernel: audit: type=1300 audit(1757118602.622:1407): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f7f505948e8 items=0 ppid=4359 pid=4776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:02.622000 audit[4776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f7f505948e8 items=0 ppid=4359 pid=4776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:02.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326430366235636333613630363438643938663664393731613563 Sep 6 00:30:02.650140 kernel: audit: type=1327 audit(1757118602.622:1407): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326430366235636333613630363438643938663664393731613563 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.660215 kernel: audit: type=1400 audit(1757118602.622:1408): avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.622000 audit: BPF prog-id=220 op=LOAD Sep 6 00:30:02.622000 audit[4776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000333bb8 items=0 ppid=4359 pid=4776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:02.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326430366235636333613630363438643938663664393731613563 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.628000 audit: BPF prog-id=221 op=LOAD Sep 6 00:30:02.628000 audit[4776]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000333c08 items=0 ppid=4359 pid=4776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:02.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326430366235636333613630363438643938663664393731613563 Sep 6 00:30:02.636000 audit: BPF prog-id=221 op=UNLOAD Sep 6 00:30:02.636000 audit: BPF prog-id=220 op=UNLOAD Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { perfmon } for pid=4776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit[4776]: AVC avc: denied { bpf } for pid=4776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:02.636000 audit: BPF prog-id=222 op=LOAD Sep 6 00:30:02.636000 audit[4776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000333c98 items=0 ppid=4359 pid=4776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:02.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326430366235636333613630363438643938663664393731613563 Sep 6 00:30:02.687424 env[1201]: time="2025-09-06T00:30:02.687363893Z" level=info msg="StartContainer for \"a92d06b5cc3a60648d98f6d971a5c0b02fd88178c7fc5676dfc4d4787b6bede3\" returns successfully" Sep 6 00:30:03.389000 audit[4718]: AVC avc: denied { watch } for pid=4718 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.3148096994/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c707 tclass=file permissive=0 Sep 6 00:30:03.389000 audit[4718]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001fa27a0 a2=fc6 a3=0 items=0 ppid=4216 pid=4718 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 key=(null) Sep 6 00:30:03.389000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:30:04.618792 kubelet[2027]: I0906 00:30:04.618605 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 00:30:04.800000 audit[4804]: NETFILTER_CFG table=filter:125 family=2 entries=11 op=nft_register_rule pid=4804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:04.800000 audit[4804]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffea75e2b40 a2=0 a3=7ffea75e2b2c items=0 ppid=2136 pid=4804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:04.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:04.807000 audit[4804]: NETFILTER_CFG table=nat:126 family=2 entries=29 op=nft_register_chain pid=4804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:04.807000 audit[4804]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffea75e2b40 a2=0 a3=7ffea75e2b2c items=0 ppid=2136 pid=4804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:04.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:08.836669 env[1201]: time="2025-09-06T00:30:08.836364755Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:08.845703 env[1201]: time="2025-09-06T00:30:08.845600530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:08.856290 env[1201]: time="2025-09-06T00:30:08.856005314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:08.863868 kubelet[2027]: I0906 00:30:08.858326 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 00:30:08.865233 env[1201]: time="2025-09-06T00:30:08.863901483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:08.867402 env[1201]: time="2025-09-06T00:30:08.865042607Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 6 00:30:08.983676 env[1201]: time="2025-09-06T00:30:08.983605635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 6 00:30:09.094057 env[1201]: time="2025-09-06T00:30:09.093731719Z" level=info msg="CreateContainer within sandbox \"4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 6 00:30:09.125113 env[1201]: time="2025-09-06T00:30:09.124944656Z" level=info msg="CreateContainer within sandbox \"4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb\"" Sep 6 00:30:09.126763 env[1201]: time="2025-09-06T00:30:09.126708914Z" level=info msg="StartContainer for \"b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb\"" Sep 6 00:30:09.206982 systemd[1]: Started cri-containerd-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb.scope. Sep 6 00:30:09.318410 kernel: kauditd_printk_skb: 48 callbacks suppressed Sep 6 00:30:09.318700 kernel: audit: type=1325 audit(1757118609.311:1416): table=filter:127 family=2 entries=10 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.327578 kernel: audit: type=1300 audit(1757118609.311:1416): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff405ea600 a2=0 a3=7fff405ea5ec items=0 ppid=2136 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.311000 audit[4834]: NETFILTER_CFG table=filter:127 family=2 entries=10 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.339103 kernel: audit: type=1327 audit(1757118609.311:1416): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.311000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff405ea600 a2=0 a3=7fff405ea5ec items=0 ppid=2136 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.338000 audit[4834]: NETFILTER_CFG table=nat:128 family=2 entries=32 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.345289 kernel: audit: type=1325 audit(1757118609.338:1417): table=nat:128 family=2 entries=32 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.338000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fff405ea600 a2=0 a3=7fff405ea5ec items=0 ppid=2136 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.359264 kernel: audit: type=1300 audit(1757118609.338:1417): arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fff405ea600 a2=0 a3=7fff405ea5ec items=0 ppid=2136 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.366122 kernel: audit: type=1327 audit(1757118609.338:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.429000 audit[4842]: NETFILTER_CFG table=filter:129 family=2 entries=10 op=nft_register_rule pid=4842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.435126 kernel: audit: type=1325 audit(1757118609.429:1418): table=filter:129 family=2 entries=10 op=nft_register_rule pid=4842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.429000 audit[4842]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd3f0cda20 a2=0 a3=7ffd3f0cda0c items=0 ppid=2136 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.455321 kernel: audit: type=1300 audit(1757118609.429:1418): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd3f0cda20 a2=0 a3=7ffd3f0cda0c items=0 ppid=2136 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.462130 kernel: audit: type=1327 audit(1757118609.429:1418): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.461000 audit[4842]: NETFILTER_CFG table=nat:130 family=2 entries=24 op=nft_register_rule pid=4842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.468124 kernel: audit: type=1325 audit(1757118609.461:1419): table=nat:130 family=2 entries=24 op=nft_register_rule pid=4842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:09.461000 audit[4842]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffd3f0cda20 a2=0 a3=7ffd3f0cda0c items=0 ppid=2136 pid=4842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.490000 audit: BPF prog-id=223 op=LOAD Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4414 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239646562356162626264333964333734313638613835343239616265 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4414 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239646562356162626264333964333734313638613835343239616265 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit: BPF prog-id=224 op=LOAD Sep 6 00:30:09.491000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001cd370 items=0 ppid=4414 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239646562356162626264333964333734313638613835343239616265 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit: BPF prog-id=225 op=LOAD Sep 6 00:30:09.491000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001cd3b8 items=0 ppid=4414 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239646562356162626264333964333734313638613835343239616265 Sep 6 00:30:09.491000 audit: BPF prog-id=225 op=UNLOAD Sep 6 00:30:09.491000 audit: BPF prog-id=224 op=UNLOAD Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:09.491000 audit: BPF prog-id=226 op=LOAD Sep 6 00:30:09.491000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001cd7c8 items=0 ppid=4414 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:09.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239646562356162626264333964333734313638613835343239616265 Sep 6 00:30:09.639120 env[1201]: time="2025-09-06T00:30:09.638959428Z" level=info msg="StartContainer for \"b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb\" returns successfully" Sep 6 00:30:10.046929 systemd[1]: run-containerd-runc-k8s.io-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb-runc.I0xgwz.mount: Deactivated successfully. Sep 6 00:30:10.549000 audit[4882]: NETFILTER_CFG table=filter:131 family=2 entries=10 op=nft_register_rule pid=4882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:10.549000 audit[4882]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd80aed8f0 a2=0 a3=7ffd80aed8dc items=0 ppid=2136 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:10.549000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:10.558000 audit[4882]: NETFILTER_CFG table=nat:132 family=2 entries=36 op=nft_register_chain pid=4882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:10.558000 audit[4882]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffd80aed8f0 a2=0 a3=7ffd80aed8dc items=0 ppid=2136 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:10.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:10.900918 systemd[1]: run-containerd-runc-k8s.io-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb-runc.7O1NRe.mount: Deactivated successfully. Sep 6 00:30:11.380362 systemd[1]: run-containerd-runc-k8s.io-656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81-runc.qY7a51.mount: Deactivated successfully. Sep 6 00:30:12.350772 kubelet[2027]: I0906 00:30:12.294904 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5d8dfc7c5-r7brn" podStartSLOduration=48.055235938 podStartE2EDuration="1m5.256186955s" podCreationTimestamp="2025-09-06 00:29:07 +0000 UTC" firstStartedPulling="2025-09-06 00:29:51.676674862 +0000 UTC m=+67.176621600" lastFinishedPulling="2025-09-06 00:30:08.877625872 +0000 UTC m=+84.377572617" observedRunningTime="2025-09-06 00:30:10.17141382 +0000 UTC m=+85.671360564" watchObservedRunningTime="2025-09-06 00:30:12.256186955 +0000 UTC m=+87.756133700" Sep 6 00:30:12.363558 systemd[1]: run-containerd-runc-k8s.io-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb-runc.9vw6eI.mount: Deactivated successfully. Sep 6 00:30:13.565565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2754004466.mount: Deactivated successfully. Sep 6 00:30:13.601685 env[1201]: time="2025-09-06T00:30:13.601011222Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:13.607976 env[1201]: time="2025-09-06T00:30:13.607859736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:13.610462 env[1201]: time="2025-09-06T00:30:13.610416123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:13.613629 env[1201]: time="2025-09-06T00:30:13.613584221Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:13.615153 env[1201]: time="2025-09-06T00:30:13.615097388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 6 00:30:13.644593 env[1201]: time="2025-09-06T00:30:13.644256771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 00:30:13.810121 env[1201]: time="2025-09-06T00:30:13.809795498Z" level=info msg="CreateContainer within sandbox \"a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 6 00:30:13.910613 env[1201]: time="2025-09-06T00:30:13.909771349Z" level=info msg="CreateContainer within sandbox \"a7d890b188c35bfbec160149c8461f19c83fe0031916753602bd639c9c5cdec1\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"55cf26315f9d216ea0fd86723ff3df5755269fd9bb55156617533166bf9c18c8\"" Sep 6 00:30:13.921813 env[1201]: time="2025-09-06T00:30:13.921757143Z" level=info msg="StartContainer for \"55cf26315f9d216ea0fd86723ff3df5755269fd9bb55156617533166bf9c18c8\"" Sep 6 00:30:14.061353 systemd[1]: Started cri-containerd-55cf26315f9d216ea0fd86723ff3df5755269fd9bb55156617533166bf9c18c8.scope. Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.087000 audit: BPF prog-id=227 op=LOAD Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3724 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:14.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636632363331356639643231366561306664383637323366663364 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3724 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:14.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636632363331356639643231366561306664383637323366663364 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit: BPF prog-id=228 op=LOAD Sep 6 00:30:14.089000 audit[4954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000380220 items=0 ppid=3724 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:14.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636632363331356639643231366561306664383637323366663364 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit: BPF prog-id=229 op=LOAD Sep 6 00:30:14.089000 audit[4954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000380268 items=0 ppid=3724 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:14.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636632363331356639643231366561306664383637323366663364 Sep 6 00:30:14.089000 audit: BPF prog-id=229 op=UNLOAD Sep 6 00:30:14.089000 audit: BPF prog-id=228 op=UNLOAD Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { perfmon } for pid=4954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit[4954]: AVC avc: denied { bpf } for pid=4954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:14.089000 audit: BPF prog-id=230 op=LOAD Sep 6 00:30:14.089000 audit[4954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000380678 items=0 ppid=3724 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:14.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636632363331356639643231366561306664383637323366663364 Sep 6 00:30:14.217730 env[1201]: time="2025-09-06T00:30:14.216065118Z" level=info msg="StartContainer for \"55cf26315f9d216ea0fd86723ff3df5755269fd9bb55156617533166bf9c18c8\" returns successfully" Sep 6 00:30:14.566448 systemd[1]: run-containerd-runc-k8s.io-55cf26315f9d216ea0fd86723ff3df5755269fd9bb55156617533166bf9c18c8-runc.n8YVG2.mount: Deactivated successfully. Sep 6 00:30:15.220291 kubelet[2027]: I0906 00:30:15.193349 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-5567488d76-4r99m" podStartSLOduration=4.104306091 podStartE2EDuration="34.062624388s" podCreationTimestamp="2025-09-06 00:29:41 +0000 UTC" firstStartedPulling="2025-09-06 00:29:43.682381961 +0000 UTC m=+59.182328699" lastFinishedPulling="2025-09-06 00:30:13.640700204 +0000 UTC m=+89.140646996" observedRunningTime="2025-09-06 00:30:15.046982349 +0000 UTC m=+90.546929096" watchObservedRunningTime="2025-09-06 00:30:15.062624388 +0000 UTC m=+90.562571138" Sep 6 00:30:15.711000 audit[4982]: NETFILTER_CFG table=filter:133 family=2 entries=9 op=nft_register_rule pid=4982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:15.747404 kernel: kauditd_printk_skb: 122 callbacks suppressed Sep 6 00:30:15.758475 kernel: audit: type=1325 audit(1757118615.711:1458): table=filter:133 family=2 entries=9 op=nft_register_rule pid=4982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:15.760041 kernel: audit: type=1300 audit(1757118615.711:1458): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffafaa6300 a2=0 a3=7fffafaa62ec items=0 ppid=2136 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:15.760202 kernel: audit: type=1327 audit(1757118615.711:1458): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:15.760278 kernel: audit: type=1325 audit(1757118615.734:1459): table=nat:134 family=2 entries=31 op=nft_register_chain pid=4982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:15.763201 kernel: audit: type=1300 audit(1757118615.734:1459): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fffafaa6300 a2=0 a3=7fffafaa62ec items=0 ppid=2136 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:15.763291 kernel: audit: type=1327 audit(1757118615.734:1459): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:15.711000 audit[4982]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffafaa6300 a2=0 a3=7fffafaa62ec items=0 ppid=2136 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:15.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:15.734000 audit[4982]: NETFILTER_CFG table=nat:134 family=2 entries=31 op=nft_register_chain pid=4982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:30:15.734000 audit[4982]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fffafaa6300 a2=0 a3=7fffafaa62ec items=0 ppid=2136 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:15.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:30:16.415038 env[1201]: time="2025-09-06T00:30:16.414943769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:16.420022 env[1201]: time="2025-09-06T00:30:16.419949852Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:16.423585 env[1201]: time="2025-09-06T00:30:16.423519518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:16.427800 env[1201]: time="2025-09-06T00:30:16.427720701Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 00:30:16.429801 env[1201]: time="2025-09-06T00:30:16.428845188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 00:30:16.584469 env[1201]: time="2025-09-06T00:30:16.584397893Z" level=info msg="CreateContainer within sandbox \"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 00:30:16.650976 env[1201]: time="2025-09-06T00:30:16.650889004Z" level=info msg="CreateContainer within sandbox \"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"553d176c4b1bfb17de19ffea8c179b3d264b7e6850d4130ba6ff8980db66be7e\"" Sep 6 00:30:16.664443 env[1201]: time="2025-09-06T00:30:16.664219764Z" level=info msg="StartContainer for \"553d176c4b1bfb17de19ffea8c179b3d264b7e6850d4130ba6ff8980db66be7e\"" Sep 6 00:30:16.823262 systemd[1]: Started cri-containerd-553d176c4b1bfb17de19ffea8c179b3d264b7e6850d4130ba6ff8980db66be7e.scope. Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.962726 kernel: audit: type=1400 audit(1757118616.901:1460): avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.962907 kernel: audit: type=1300 audit(1757118616.901:1460): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fbf8d5c4c68 items=0 ppid=4359 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:16.962973 kernel: audit: type=1327 audit(1757118616.901:1460): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535336431373663346231626662313764653139666665613863313739 Sep 6 00:30:16.963041 kernel: audit: type=1400 audit(1757118616.901:1461): avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fbf8d5c4c68 items=0 ppid=4359 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:16.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535336431373663346231626662313764653139666665613863313739 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.901000 audit: BPF prog-id=231 op=LOAD Sep 6 00:30:16.901000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000098cd8 items=0 ppid=4359 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:16.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535336431373663346231626662313764653139666665613863313739 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit: BPF prog-id=232 op=LOAD Sep 6 00:30:16.928000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000098d28 items=0 ppid=4359 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:16.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535336431373663346231626662313764653139666665613863313739 Sep 6 00:30:16.928000 audit: BPF prog-id=232 op=UNLOAD Sep 6 00:30:16.928000 audit: BPF prog-id=231 op=UNLOAD Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { perfmon } for pid=4993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit[4993]: AVC avc: denied { bpf } for pid=4993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 00:30:16.928000 audit: BPF prog-id=233 op=LOAD Sep 6 00:30:16.928000 audit[4993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000098db8 items=0 ppid=4359 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:30:16.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535336431373663346231626662313764653139666665613863313739 Sep 6 00:30:17.005708 env[1201]: time="2025-09-06T00:30:17.005627200Z" level=info msg="StartContainer for \"553d176c4b1bfb17de19ffea8c179b3d264b7e6850d4130ba6ff8980db66be7e\" returns successfully" Sep 6 00:30:17.617745 systemd[1]: run-containerd-runc-k8s.io-553d176c4b1bfb17de19ffea8c179b3d264b7e6850d4130ba6ff8980db66be7e-runc.DgewNH.mount: Deactivated successfully. Sep 6 00:30:17.647366 kubelet[2027]: I0906 00:30:17.631127 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ttshf" podStartSLOduration=45.586989143 podStartE2EDuration="1m10.600664084s" podCreationTimestamp="2025-09-06 00:29:07 +0000 UTC" firstStartedPulling="2025-09-06 00:29:51.431855894 +0000 UTC m=+66.931802631" lastFinishedPulling="2025-09-06 00:30:16.44553084 +0000 UTC m=+91.945477572" observedRunningTime="2025-09-06 00:30:17.565715654 +0000 UTC m=+93.065662411" watchObservedRunningTime="2025-09-06 00:30:17.600664084 +0000 UTC m=+93.100610862" Sep 6 00:30:18.422354 kubelet[2027]: I0906 00:30:18.422197 2027 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 00:30:18.423990 kubelet[2027]: I0906 00:30:18.423940 2027 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 00:30:39.798000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.820179 kernel: kauditd_printk_skb: 39 callbacks suppressed Sep 6 00:30:39.823408 kernel: audit: type=1400 audit(1757118639.798:1466): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.824046 kernel: audit: type=1400 audit(1757118639.798:1467): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.824585 kernel: audit: type=1300 audit(1757118639.798:1466): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006bd3bf0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.798000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.798000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c006bd3bf0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.833198 kernel: audit: type=1327 audit(1757118639.798:1466): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.798000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c007db29c0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.851216 kernel: audit: type=1300 audit(1757118639.798:1467): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c007db29c0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.826000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.866293 kernel: audit: type=1327 audit(1757118639.798:1467): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.866457 kernel: audit: type=1400 audit(1757118639.826:1468): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.882470 kernel: audit: type=1300 audit(1757118639.826:1468): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0076e5380 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.826000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0076e5380 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.826000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.893133 kernel: audit: type=1327 audit(1757118639.826:1468): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.831000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.904112 kernel: audit: type=1400 audit(1757118639.831:1469): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.831000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c012888480 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.831000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.902000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.902000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c004963ac0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.902000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.903000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.903000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c007db37d0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:30:39.903000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:30:39.953000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.953000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0031b5600 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:39.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:39.953000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:39.953000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027a6b70 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:39.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:40.657859 systemd[1]: run-containerd-runc-k8s.io-b4268f6e6b92addd096e1aa25964fc8e2f52fefc064a974f1c0f7b7ec2073acc-runc.AYfMIJ.mount: Deactivated successfully. Sep 6 00:30:46.868640 env[1201]: time="2025-09-06T00:30:46.868496509Z" level=info msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" Sep 6 00:30:47.399000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.426845 kernel: kauditd_printk_skb: 14 callbacks suppressed Sep 6 00:30:47.430726 kernel: audit: type=1400 audit(1757118647.399:1474): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.432491 kernel: audit: type=1300 audit(1757118647.399:1474): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003302020 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.432606 kernel: audit: type=1327 audit(1757118647.399:1474): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.433056 kernel: audit: type=1400 audit(1757118647.426:1475): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.399000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003302020 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.439249 kernel: audit: type=1300 audit(1757118647.426:1475): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0032b8300 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.399000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.426000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.426000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0032b8300 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.429000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.459547 kernel: audit: type=1327 audit(1757118647.426:1475): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.459757 kernel: audit: type=1400 audit(1757118647.429:1476): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.459825 kernel: audit: type=1300 audit(1757118647.429:1476): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0032b8320 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.429000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0032b8320 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.468936 kernel: audit: type=1327 audit(1757118647.429:1476): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.433000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.482553 kernel: audit: type=1400 audit(1757118647.433:1477): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:30:47.433000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0033021c0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:30:47.433000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.361 [WARNING][5130] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"14c664da-0dcf-4e43-ad38-6dfc23481a33", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e", Pod:"calico-apiserver-78f697856d-s2f4g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5df4e13219", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.364 [INFO][5130] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.364 [INFO][5130] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" iface="eth0" netns="" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.364 [INFO][5130] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.364 [INFO][5130] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.822 [INFO][5137] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.830 [INFO][5137] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.831 [INFO][5137] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.868 [WARNING][5137] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.875 [INFO][5137] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.889 [INFO][5137] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:47.897082 env[1201]: 2025-09-06 00:30:47.894 [INFO][5130] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:47.912845 env[1201]: time="2025-09-06T00:30:47.897717760Z" level=info msg="TearDown network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" successfully" Sep 6 00:30:47.912845 env[1201]: time="2025-09-06T00:30:47.897771525Z" level=info msg="StopPodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" returns successfully" Sep 6 00:30:47.912845 env[1201]: time="2025-09-06T00:30:47.912497730Z" level=info msg="RemovePodSandbox for \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" Sep 6 00:30:47.912845 env[1201]: time="2025-09-06T00:30:47.912571697Z" level=info msg="Forcibly stopping sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\"" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.097 [WARNING][5152] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0", GenerateName:"calico-apiserver-78f697856d-", Namespace:"calico-apiserver", SelfLink:"", UID:"14c664da-0dcf-4e43-ad38-6dfc23481a33", ResourceVersion:"1123", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78f697856d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"4a8082a0893d65e52f6edbf7baa96ce611921769530f885741b9dded90d6a28e", Pod:"calico-apiserver-78f697856d-s2f4g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie5df4e13219", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.097 [INFO][5152] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.097 [INFO][5152] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" iface="eth0" netns="" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.097 [INFO][5152] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.097 [INFO][5152] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.182 [INFO][5159] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.183 [INFO][5159] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.183 [INFO][5159] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.210 [WARNING][5159] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.210 [INFO][5159] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" HandleID="k8s-pod-network.cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--apiserver--78f697856d--s2f4g-eth0" Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.217 [INFO][5159] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:48.227573 env[1201]: 2025-09-06 00:30:48.225 [INFO][5152] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e" Sep 6 00:30:48.230307 env[1201]: time="2025-09-06T00:30:48.227640297Z" level=info msg="TearDown network for sandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" successfully" Sep 6 00:30:48.247121 env[1201]: time="2025-09-06T00:30:48.247025169Z" level=info msg="RemovePodSandbox \"cf901128bbd41699ab39b667aa538665758a0af6d1ce812cec48d6a34c300c0e\" returns successfully" Sep 6 00:30:48.248083 env[1201]: time="2025-09-06T00:30:48.248042147Z" level=info msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.419 [WARNING][5173] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da", Pod:"coredns-674b8bbfcf-d5w6h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib1799085109", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.420 [INFO][5173] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.420 [INFO][5173] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" iface="eth0" netns="" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.420 [INFO][5173] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.420 [INFO][5173] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.513 [INFO][5182] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.514 [INFO][5182] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.514 [INFO][5182] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.529 [WARNING][5182] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.529 [INFO][5182] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.533 [INFO][5182] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:48.545250 env[1201]: 2025-09-06 00:30:48.539 [INFO][5173] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.545250 env[1201]: time="2025-09-06T00:30:48.542064293Z" level=info msg="TearDown network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" successfully" Sep 6 00:30:48.545250 env[1201]: time="2025-09-06T00:30:48.542148372Z" level=info msg="StopPodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" returns successfully" Sep 6 00:30:48.545250 env[1201]: time="2025-09-06T00:30:48.543687364Z" level=info msg="RemovePodSandbox for \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" Sep 6 00:30:48.545250 env[1201]: time="2025-09-06T00:30:48.543738813Z" level=info msg="Forcibly stopping sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\"" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.662 [WARNING][5196] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ad7d0935-9a1f-48ec-af2b-9a3b763c9e06", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 28, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"20e320f24df30790e315b5826a2b2f3f654f2e9fbd242c061a7c26ba12c7c5da", Pod:"coredns-674b8bbfcf-d5w6h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib1799085109", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.663 [INFO][5196] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.663 [INFO][5196] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" iface="eth0" netns="" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.663 [INFO][5196] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.663 [INFO][5196] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.786 [INFO][5204] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.788 [INFO][5204] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.788 [INFO][5204] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.809 [WARNING][5204] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.809 [INFO][5204] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" HandleID="k8s-pod-network.113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Workload="srv--vva2b.gb1.brightbox.com-k8s-coredns--674b8bbfcf--d5w6h-eth0" Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.812 [INFO][5204] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:48.819566 env[1201]: 2025-09-06 00:30:48.816 [INFO][5196] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69" Sep 6 00:30:48.819566 env[1201]: time="2025-09-06T00:30:48.818746021Z" level=info msg="TearDown network for sandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" successfully" Sep 6 00:30:48.834157 env[1201]: time="2025-09-06T00:30:48.833690449Z" level=info msg="RemovePodSandbox \"113000d0bc6eb0c859df50edf2ca237c4b7dcfacd1cb5a7801314425e3150d69\" returns successfully" Sep 6 00:30:48.842848 env[1201]: time="2025-09-06T00:30:48.842779480Z" level=info msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:48.987 [WARNING][5218] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0", GenerateName:"calico-kube-controllers-5d8dfc7c5-", Namespace:"calico-system", SelfLink:"", UID:"a76dcbff-37b9-4dc5-8732-1cbee8470613", ResourceVersion:"1143", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d8dfc7c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463", Pod:"calico-kube-controllers-5d8dfc7c5-r7brn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c0008f209", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:48.988 [INFO][5218] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:48.988 [INFO][5218] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" iface="eth0" netns="" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:48.988 [INFO][5218] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:48.988 [INFO][5218] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.072 [INFO][5225] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.081 [INFO][5225] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.084 [INFO][5225] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.102 [WARNING][5225] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.102 [INFO][5225] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.105 [INFO][5225] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:49.118168 env[1201]: 2025-09-06 00:30:49.110 [INFO][5218] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.118168 env[1201]: time="2025-09-06T00:30:49.117868698Z" level=info msg="TearDown network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" successfully" Sep 6 00:30:49.118168 env[1201]: time="2025-09-06T00:30:49.117960501Z" level=info msg="StopPodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" returns successfully" Sep 6 00:30:49.151297 env[1201]: time="2025-09-06T00:30:49.151230693Z" level=info msg="RemovePodSandbox for \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" Sep 6 00:30:49.151702 env[1201]: time="2025-09-06T00:30:49.151631534Z" level=info msg="Forcibly stopping sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\"" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.368 [WARNING][5242] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0", GenerateName:"calico-kube-controllers-5d8dfc7c5-", Namespace:"calico-system", SelfLink:"", UID:"a76dcbff-37b9-4dc5-8732-1cbee8470613", ResourceVersion:"1143", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5d8dfc7c5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"4b1ad8124d41cbef9b42d35a8fb8ea8687f2200d38809fef373b45ba53211463", Pod:"calico-kube-controllers-5d8dfc7c5-r7brn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali72c0008f209", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.369 [INFO][5242] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.369 [INFO][5242] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" iface="eth0" netns="" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.369 [INFO][5242] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.369 [INFO][5242] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.437 [INFO][5249] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.438 [INFO][5249] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.438 [INFO][5249] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.456 [WARNING][5249] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.456 [INFO][5249] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" HandleID="k8s-pod-network.937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Workload="srv--vva2b.gb1.brightbox.com-k8s-calico--kube--controllers--5d8dfc7c5--r7brn-eth0" Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.468 [INFO][5249] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:49.475392 env[1201]: 2025-09-06 00:30:49.473 [INFO][5242] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee" Sep 6 00:30:49.487298 env[1201]: time="2025-09-06T00:30:49.476021373Z" level=info msg="TearDown network for sandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" successfully" Sep 6 00:30:49.511591 env[1201]: time="2025-09-06T00:30:49.511503102Z" level=info msg="RemovePodSandbox \"937deed8971bfd9167bae28d6302cc94a5488551de319a41812f102cca9befee\" returns successfully" Sep 6 00:30:49.513816 env[1201]: time="2025-09-06T00:30:49.512960664Z" level=info msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.645 [WARNING][5265] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1debf633-9211-4db0-9299-eca2c0eba673", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186", Pod:"csi-node-driver-ttshf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a3d65db0ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.646 [INFO][5265] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.646 [INFO][5265] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" iface="eth0" netns="" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.652 [INFO][5265] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.652 [INFO][5265] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.710 [INFO][5273] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.710 [INFO][5273] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.710 [INFO][5273] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.720 [WARNING][5273] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.720 [INFO][5273] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.726 [INFO][5273] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:49.732024 env[1201]: 2025-09-06 00:30:49.728 [INFO][5265] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.732024 env[1201]: time="2025-09-06T00:30:49.731259051Z" level=info msg="TearDown network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" successfully" Sep 6 00:30:49.732024 env[1201]: time="2025-09-06T00:30:49.731308477Z" level=info msg="StopPodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" returns successfully" Sep 6 00:30:49.736389 env[1201]: time="2025-09-06T00:30:49.732269094Z" level=info msg="RemovePodSandbox for \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" Sep 6 00:30:49.736389 env[1201]: time="2025-09-06T00:30:49.732326479Z" level=info msg="Forcibly stopping sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\"" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.833 [WARNING][5288] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1debf633-9211-4db0-9299-eca2c0eba673", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 0, 29, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-vva2b.gb1.brightbox.com", ContainerID:"5135cec24bd7750db83f502c7227037707bc585fc82d6c256fdc50425f597186", Pod:"csi-node-driver-ttshf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9a3d65db0ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.834 [INFO][5288] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.834 [INFO][5288] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" iface="eth0" netns="" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.834 [INFO][5288] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.834 [INFO][5288] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.912 [INFO][5295] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.913 [INFO][5295] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.913 [INFO][5295] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.927 [WARNING][5295] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.927 [INFO][5295] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" HandleID="k8s-pod-network.a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Workload="srv--vva2b.gb1.brightbox.com-k8s-csi--node--driver--ttshf-eth0" Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.930 [INFO][5295] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 00:30:49.935613 env[1201]: 2025-09-06 00:30:49.933 [INFO][5288] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8" Sep 6 00:30:49.940308 env[1201]: time="2025-09-06T00:30:49.936273119Z" level=info msg="TearDown network for sandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" successfully" Sep 6 00:30:50.084960 env[1201]: time="2025-09-06T00:30:50.083335413Z" level=info msg="RemovePodSandbox \"a164ac614ac62252347e88d5c6be501e6df9349518d50f626e20bbaedd655cb8\" returns successfully" Sep 6 00:30:54.339000 audit[4447]: AVC avc: denied { watch } for pid=4447 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.1777534731/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c355,c644 tclass=file permissive=0 Sep 6 00:30:54.360760 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 6 00:30:54.363170 kernel: audit: type=1400 audit(1757118654.339:1478): avc: denied { watch } for pid=4447 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.1777534731/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c355,c644 tclass=file permissive=0 Sep 6 00:30:54.364395 kernel: audit: type=1300 audit(1757118654.339:1478): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001d9ca60 a2=fc6 a3=0 items=0 ppid=3759 pid=4447 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 key=(null) Sep 6 00:30:54.364493 kernel: audit: type=1327 audit(1757118654.339:1478): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:30:54.339000 audit[4447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001d9ca60 a2=fc6 a3=0 items=0 ppid=3759 pid=4447 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 key=(null) Sep 6 00:30:54.339000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:31:03.407000 audit[4718]: AVC avc: denied { watch } for pid=4718 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.3148096994/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c707 tclass=file permissive=0 Sep 6 00:31:03.475040 kernel: audit: type=1400 audit(1757118663.407:1479): avc: denied { watch } for pid=4718 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.3148096994/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c707 tclass=file permissive=0 Sep 6 00:31:03.476826 kernel: audit: type=1300 audit(1757118663.407:1479): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022b1980 a2=fc6 a3=0 items=0 ppid=4216 pid=4718 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 key=(null) Sep 6 00:31:03.476921 kernel: audit: type=1327 audit(1757118663.407:1479): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:31:03.476980 kernel: audit: type=1130 audit(1757118663.469:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.9.98:22-139.178.89.65:59888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:03.407000 audit[4718]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022b1980 a2=fc6 a3=0 items=0 ppid=4216 pid=4718 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 key=(null) Sep 6 00:31:03.407000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:31:03.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.9.98:22-139.178.89.65:59888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:03.465707 systemd[1]: Started sshd@9-10.244.9.98:22-139.178.89.65:59888.service. Sep 6 00:31:04.563000 audit[5327]: USER_ACCT pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:04.572202 kernel: audit: type=1101 audit(1757118664.563:1481): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:04.572427 sshd[5327]: Accepted publickey for core from 139.178.89.65 port 59888 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:04.575000 audit[5327]: CRED_ACQ pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:04.581063 sshd[5327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:04.583121 kernel: audit: type=1103 audit(1757118664.575:1482): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:04.583241 kernel: audit: type=1006 audit(1757118664.575:1483): pid=5327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 6 00:31:04.588408 kernel: audit: type=1300 audit(1757118664.575:1483): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeec060ae0 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:04.575000 audit[5327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeec060ae0 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:04.575000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:04.601114 kernel: audit: type=1327 audit(1757118664.575:1483): proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:04.673011 systemd-logind[1185]: New session 10 of user core. Sep 6 00:31:04.679948 systemd[1]: Started session-10.scope. Sep 6 00:31:04.692000 audit[5327]: USER_START pid=5327 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:04.702133 kernel: audit: type=1105 audit(1757118664.692:1484): pid=5327 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:04.705000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:06.957035 sshd[5327]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:06.970000 audit[5327]: USER_END pid=5327 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:06.970000 audit[5327]: CRED_DISP pid=5327 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:06.997467 systemd[1]: sshd@9-10.244.9.98:22-139.178.89.65:59888.service: Deactivated successfully. Sep 6 00:31:06.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.9.98:22-139.178.89.65:59888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:07.004663 systemd[1]: session-10.scope: Deactivated successfully. Sep 6 00:31:07.005772 systemd-logind[1185]: Session 10 logged out. Waiting for processes to exit. Sep 6 00:31:07.010751 systemd-logind[1185]: Removed session 10. Sep 6 00:31:11.729003 systemd[1]: run-containerd-runc-k8s.io-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb-runc.YQGBN4.mount: Deactivated successfully. Sep 6 00:31:12.046493 systemd[1]: run-containerd-runc-k8s.io-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb-runc.GWzhln.mount: Deactivated successfully. Sep 6 00:31:12.131661 systemd[1]: Started sshd@10-10.244.9.98:22-139.178.89.65:47988.service. Sep 6 00:31:12.151721 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 6 00:31:12.158775 kernel: audit: type=1130 audit(1757118672.137:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.9.98:22-139.178.89.65:47988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:12.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.9.98:22-139.178.89.65:47988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:13.226848 sshd[5400]: Accepted publickey for core from 139.178.89.65 port 47988 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:13.250458 kernel: audit: type=1101 audit(1757118673.225:1490): pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.225000 audit[5400]: USER_ACCT pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.257000 audit[5400]: CRED_ACQ pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.267910 kernel: audit: type=1103 audit(1757118673.257:1491): pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.290126 kernel: audit: type=1006 audit(1757118673.257:1492): pid=5400 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Sep 6 00:31:13.292251 sshd[5400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:13.257000 audit[5400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc756d98d0 a2=3 a3=0 items=0 ppid=1 pid=5400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:13.324122 kernel: audit: type=1300 audit(1757118673.257:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc756d98d0 a2=3 a3=0 items=0 ppid=1 pid=5400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:13.324291 kernel: audit: type=1327 audit(1757118673.257:1492): proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:13.257000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:13.360132 systemd-logind[1185]: New session 11 of user core. Sep 6 00:31:13.366176 systemd[1]: Started session-11.scope. Sep 6 00:31:13.392000 audit[5400]: USER_START pid=5400 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.403047 kernel: audit: type=1105 audit(1757118673.392:1493): pid=5400 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.402000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:13.414148 kernel: audit: type=1103 audit(1757118673.402:1494): pid=5409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:15.823795 sshd[5400]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:15.854000 audit[5400]: USER_END pid=5400 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:15.864156 kernel: audit: type=1106 audit(1757118675.854:1495): pid=5400 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:15.869142 kernel: audit: type=1104 audit(1757118675.864:1496): pid=5400 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:15.864000 audit[5400]: CRED_DISP pid=5400 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:15.871099 systemd[1]: sshd@10-10.244.9.98:22-139.178.89.65:47988.service: Deactivated successfully. Sep 6 00:31:15.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.9.98:22-139.178.89.65:47988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:15.877415 systemd[1]: session-11.scope: Deactivated successfully. Sep 6 00:31:15.881325 systemd-logind[1185]: Session 11 logged out. Waiting for processes to exit. Sep 6 00:31:15.897754 systemd-logind[1185]: Removed session 11. Sep 6 00:31:20.997406 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 6 00:31:21.003017 kernel: audit: type=1130 audit(1757118680.987:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.9.98:22-139.178.89.65:44618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:20.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.9.98:22-139.178.89.65:44618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:20.988519 systemd[1]: Started sshd@11-10.244.9.98:22-139.178.89.65:44618.service. Sep 6 00:31:21.979314 sshd[5444]: Accepted publickey for core from 139.178.89.65 port 44618 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:21.987697 kernel: audit: type=1101 audit(1757118681.978:1499): pid=5444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:21.978000 audit[5444]: USER_ACCT pid=5444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:21.987000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:21.996148 kernel: audit: type=1103 audit(1757118681.987:1500): pid=5444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:22.000260 kernel: audit: type=1006 audit(1757118681.988:1501): pid=5444 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 6 00:31:21.988000 audit[5444]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff86f40d0 a2=3 a3=0 items=0 ppid=1 pid=5444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:22.014069 kernel: audit: type=1300 audit(1757118681.988:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff86f40d0 a2=3 a3=0 items=0 ppid=1 pid=5444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:22.015155 kernel: audit: type=1327 audit(1757118681.988:1501): proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:21.988000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:22.012145 sshd[5444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:22.033675 systemd-logind[1185]: New session 12 of user core. Sep 6 00:31:22.035329 systemd[1]: Started session-12.scope. Sep 6 00:31:22.044000 audit[5444]: USER_START pid=5444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:22.045000 audit[5446]: CRED_ACQ pid=5446 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:22.064501 kernel: audit: type=1105 audit(1757118682.044:1502): pid=5444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:22.064663 kernel: audit: type=1103 audit(1757118682.045:1503): pid=5446 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:23.359630 sshd[5444]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:23.362000 audit[5444]: USER_END pid=5444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:23.372119 kernel: audit: type=1106 audit(1757118683.362:1504): pid=5444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:23.372959 systemd[1]: sshd@11-10.244.9.98:22-139.178.89.65:44618.service: Deactivated successfully. Sep 6 00:31:23.362000 audit[5444]: CRED_DISP pid=5444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:23.375416 systemd[1]: session-12.scope: Deactivated successfully. Sep 6 00:31:23.376881 systemd-logind[1185]: Session 12 logged out. Waiting for processes to exit. Sep 6 00:31:23.384202 kernel: audit: type=1104 audit(1757118683.362:1505): pid=5444 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:23.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.9.98:22-139.178.89.65:44618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:23.384787 systemd-logind[1185]: Removed session 12. Sep 6 00:31:28.556365 systemd[1]: Started sshd@12-10.244.9.98:22-139.178.89.65:44620.service. Sep 6 00:31:28.579218 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 6 00:31:28.582791 kernel: audit: type=1130 audit(1757118688.558:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.9.98:22-139.178.89.65:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:28.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.9.98:22-139.178.89.65:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:29.589461 sshd[5457]: Accepted publickey for core from 139.178.89.65 port 44620 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:29.599885 kernel: audit: type=1101 audit(1757118689.586:1508): pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.586000 audit[5457]: USER_ACCT pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.601906 sshd[5457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:29.597000 audit[5457]: CRED_ACQ pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.614041 kernel: audit: type=1103 audit(1757118689.597:1509): pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.614162 kernel: audit: type=1006 audit(1757118689.597:1510): pid=5457 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Sep 6 00:31:29.597000 audit[5457]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f7d3220 a2=3 a3=0 items=0 ppid=1 pid=5457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:29.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:29.624578 kernel: audit: type=1300 audit(1757118689.597:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f7d3220 a2=3 a3=0 items=0 ppid=1 pid=5457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:29.625294 kernel: audit: type=1327 audit(1757118689.597:1510): proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:29.656971 systemd-logind[1185]: New session 13 of user core. Sep 6 00:31:29.660401 systemd[1]: Started session-13.scope. Sep 6 00:31:29.671000 audit[5457]: USER_START pid=5457 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.684133 kernel: audit: type=1105 audit(1757118689.671:1511): pid=5457 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.686515 kernel: audit: type=1103 audit(1757118689.679:1512): pid=5459 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:29.679000 audit[5459]: CRED_ACQ pid=5459 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:32.343725 sshd[5457]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:32.424129 kernel: audit: type=1106 audit(1757118692.402:1513): pid=5457 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:32.428246 kernel: audit: type=1104 audit(1757118692.415:1514): pid=5457 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:32.402000 audit[5457]: USER_END pid=5457 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:32.415000 audit[5457]: CRED_DISP pid=5457 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.9.98:22-139.178.89.65:44620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:32.422935 systemd[1]: sshd@12-10.244.9.98:22-139.178.89.65:44620.service: Deactivated successfully. Sep 6 00:31:32.428785 systemd[1]: session-13.scope: Deactivated successfully. Sep 6 00:31:32.433761 systemd-logind[1185]: Session 13 logged out. Waiting for processes to exit. Sep 6 00:31:32.442876 systemd-logind[1185]: Removed session 13. Sep 6 00:31:32.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.9.98:22-139.178.89.65:39246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:32.499610 systemd[1]: Started sshd@13-10.244.9.98:22-139.178.89.65:39246.service. Sep 6 00:31:33.507000 audit[5490]: USER_ACCT pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:33.511862 sshd[5490]: Accepted publickey for core from 139.178.89.65 port 39246 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:33.519000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:33.520000 audit[5490]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d541e30 a2=3 a3=0 items=0 ppid=1 pid=5490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:33.520000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:33.543438 sshd[5490]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:33.597319 systemd-logind[1185]: New session 14 of user core. Sep 6 00:31:33.602182 systemd[1]: Started session-14.scope. Sep 6 00:31:33.612000 audit[5490]: USER_START pid=5490 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:33.615487 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 6 00:31:33.618057 kernel: audit: type=1105 audit(1757118693.612:1520): pid=5490 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:33.625027 kernel: audit: type=1103 audit(1757118693.623:1521): pid=5492 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:33.623000 audit[5492]: CRED_ACQ pid=5492 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:35.098122 sshd[5490]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:35.115376 kernel: audit: type=1106 audit(1757118695.100:1522): pid=5490 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:35.116636 kernel: audit: type=1104 audit(1757118695.100:1523): pid=5490 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:35.100000 audit[5490]: USER_END pid=5490 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:35.129700 kernel: audit: type=1131 audit(1757118695.100:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.9.98:22-139.178.89.65:39246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:35.100000 audit[5490]: CRED_DISP pid=5490 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:35.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.9.98:22-139.178.89.65:39246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:35.106137 systemd[1]: sshd@13-10.244.9.98:22-139.178.89.65:39246.service: Deactivated successfully. Sep 6 00:31:35.107795 systemd[1]: session-14.scope: Deactivated successfully. Sep 6 00:31:35.111609 systemd-logind[1185]: Session 14 logged out. Waiting for processes to exit. Sep 6 00:31:35.119914 systemd-logind[1185]: Removed session 14. Sep 6 00:31:35.256751 systemd[1]: Started sshd@14-10.244.9.98:22-139.178.89.65:39262.service. Sep 6 00:31:35.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.9.98:22-139.178.89.65:39262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:35.266901 kernel: audit: type=1130 audit(1757118695.256:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.9.98:22-139.178.89.65:39262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:36.328000 audit[5500]: USER_ACCT pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:36.352662 kernel: audit: type=1101 audit(1757118696.328:1526): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:36.352816 kernel: audit: type=1103 audit(1757118696.337:1527): pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:36.353920 kernel: audit: type=1006 audit(1757118696.337:1528): pid=5500 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Sep 6 00:31:36.354490 kernel: audit: type=1300 audit(1757118696.337:1528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd5dd99c0 a2=3 a3=0 items=0 ppid=1 pid=5500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:36.337000 audit[5500]: CRED_ACQ pid=5500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:36.337000 audit[5500]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd5dd99c0 a2=3 a3=0 items=0 ppid=1 pid=5500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:36.337000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:36.381840 sshd[5500]: Accepted publickey for core from 139.178.89.65 port 39262 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:36.343240 sshd[5500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:36.380516 systemd-logind[1185]: New session 15 of user core. Sep 6 00:31:36.382856 systemd[1]: Started session-15.scope. Sep 6 00:31:36.395000 audit[5500]: USER_START pid=5500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:36.399000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:38.297212 sshd[5500]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:38.312000 audit[5500]: USER_END pid=5500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:38.316000 audit[5500]: CRED_DISP pid=5500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:38.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.9.98:22-139.178.89.65:39262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:38.331484 systemd[1]: sshd@14-10.244.9.98:22-139.178.89.65:39262.service: Deactivated successfully. Sep 6 00:31:38.333875 systemd[1]: session-15.scope: Deactivated successfully. Sep 6 00:31:38.334889 systemd-logind[1185]: Session 15 logged out. Waiting for processes to exit. Sep 6 00:31:38.338687 systemd-logind[1185]: Removed session 15. Sep 6 00:31:39.823258 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 6 00:31:39.847520 kernel: audit: type=1400 audit(1757118699.815:1534): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.847676 kernel: audit: type=1300 audit(1757118699.815:1534): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c006b973b0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.847729 kernel: audit: type=1327 audit(1757118699.815:1534): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.847790 kernel: audit: type=1400 audit(1757118699.830:1535): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.815000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.856684 kernel: audit: type=1300 audit(1757118699.830:1535): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0074b1c60 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.815000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c006b973b0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.863698 kernel: audit: type=1327 audit(1757118699.830:1535): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.830000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.830000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0074b1c60 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.830000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.840000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.840000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fce63c0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.896045 kernel: audit: type=1400 audit(1757118699.840:1536): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.896270 kernel: audit: type=1300 audit(1757118699.840:1536): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fce63c0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.905169 kernel: audit: type=1327 audit(1757118699.840:1536): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.905377 kernel: audit: type=1400 audit(1757118699.846:1537): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.846000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.846000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fce6420 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.846000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.904000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.904000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c003822900 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.904000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.904000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.904000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c004fc87a0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:31:39.904000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:31:39.975000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.975000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c36e10 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:39.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:39.975000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:39.975000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012fb8e0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:39.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:41.384565 systemd[1]: run-containerd-runc-k8s.io-656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81-runc.xtTomZ.mount: Deactivated successfully. Sep 6 00:31:43.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.9.98:22-139.178.89.65:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:43.505589 systemd[1]: Started sshd@15-10.244.9.98:22-139.178.89.65:41870.service. Sep 6 00:31:44.577000 audit[5568]: USER_ACCT pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:44.580000 audit[5568]: CRED_ACQ pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:44.580000 audit[5568]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff742b1050 a2=3 a3=0 items=0 ppid=1 pid=5568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:44.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:44.585613 sshd[5568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:44.616777 sshd[5568]: Accepted publickey for core from 139.178.89.65 port 41870 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:44.703541 systemd-logind[1185]: New session 16 of user core. Sep 6 00:31:44.710874 systemd[1]: Started session-16.scope. Sep 6 00:31:44.722000 audit[5568]: USER_START pid=5568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:44.729000 audit[5574]: CRED_ACQ pid=5574 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:46.900201 kubelet[2027]: E0906 00:31:46.833156 2027 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.934s" Sep 6 00:31:47.467985 kernel: kauditd_printk_skb: 22 callbacks suppressed Sep 6 00:31:47.508169 kernel: audit: type=1400 audit(1757118707.456:1548): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.509572 kernel: audit: type=1300 audit(1757118707.456:1548): arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000d1afa0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.509699 kernel: audit: type=1327 audit(1757118707.456:1548): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:47.456000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.579236 kernel: audit: type=1400 audit(1757118707.512:1549): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.579835 kernel: audit: type=1300 audit(1757118707.512:1549): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d1b0c0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.579907 kernel: audit: type=1327 audit(1757118707.512:1549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:47.580032 kernel: audit: type=1400 audit(1757118707.516:1550): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.582659 kernel: audit: type=1300 audit(1757118707.516:1550): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003e3460 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.582731 kernel: audit: type=1327 audit(1757118707.516:1550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:47.583256 kernel: audit: type=1400 audit(1757118707.539:1551): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.456000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000d1afa0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:47.512000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.512000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d1b0c0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.512000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:47.516000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.516000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003e3460 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:47.539000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:31:47.539000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0003e39a0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:31:47.539000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:31:48.253874 sshd[5568]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:48.298000 audit[5568]: USER_END pid=5568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:48.300000 audit[5568]: CRED_DISP pid=5568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:48.318702 systemd[1]: sshd@15-10.244.9.98:22-139.178.89.65:41870.service: Deactivated successfully. Sep 6 00:31:48.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.9.98:22-139.178.89.65:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:48.330689 systemd[1]: session-16.scope: Deactivated successfully. Sep 6 00:31:48.332658 systemd-logind[1185]: Session 16 logged out. Waiting for processes to exit. Sep 6 00:31:48.336820 systemd-logind[1185]: Removed session 16. Sep 6 00:31:53.451003 systemd[1]: Started sshd@16-10.244.9.98:22-139.178.89.65:42520.service. Sep 6 00:31:53.483228 kernel: kauditd_printk_skb: 5 callbacks suppressed Sep 6 00:31:53.488536 kernel: audit: type=1130 audit(1757118713.452:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.9.98:22-139.178.89.65:42520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:53.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.9.98:22-139.178.89.65:42520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:54.389000 audit[4447]: AVC avc: denied { watch } for pid=4447 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.1777534731/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c355,c644 tclass=file permissive=0 Sep 6 00:31:54.434668 kernel: audit: type=1400 audit(1757118714.389:1556): avc: denied { watch } for pid=4447 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.1777534731/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c355,c644 tclass=file permissive=0 Sep 6 00:31:54.434867 kernel: audit: type=1300 audit(1757118714.389:1556): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00277a300 a2=fc6 a3=0 items=0 ppid=3759 pid=4447 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 key=(null) Sep 6 00:31:54.435134 kernel: audit: type=1327 audit(1757118714.389:1556): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:31:54.389000 audit[4447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00277a300 a2=fc6 a3=0 items=0 ppid=3759 pid=4447 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c644 key=(null) Sep 6 00:31:54.389000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:31:54.545000 audit[5587]: USER_ACCT pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:54.560606 kernel: audit: type=1101 audit(1757118714.545:1557): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:54.560753 sshd[5587]: Accepted publickey for core from 139.178.89.65 port 42520 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:31:54.562000 audit[5587]: CRED_ACQ pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:54.578984 kernel: audit: type=1103 audit(1757118714.562:1558): pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:54.579333 kernel: audit: type=1006 audit(1757118714.572:1559): pid=5587 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 6 00:31:54.579421 kernel: audit: type=1300 audit(1757118714.572:1559): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd52c6cf40 a2=3 a3=0 items=0 ppid=1 pid=5587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:54.572000 audit[5587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd52c6cf40 a2=3 a3=0 items=0 ppid=1 pid=5587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:31:54.580792 sshd[5587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:31:54.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:54.593122 kernel: audit: type=1327 audit(1757118714.572:1559): proctitle=737368643A20636F7265205B707269765D Sep 6 00:31:54.663930 systemd-logind[1185]: New session 17 of user core. Sep 6 00:31:54.666230 systemd[1]: Started session-17.scope. Sep 6 00:31:54.684000 audit[5587]: USER_START pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:54.697316 kernel: audit: type=1105 audit(1757118714.684:1560): pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:54.696000 audit[5589]: CRED_ACQ pid=5589 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:56.295460 sshd[5587]: pam_unix(sshd:session): session closed for user core Sep 6 00:31:56.317000 audit[5587]: USER_END pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:56.319000 audit[5587]: CRED_DISP pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:31:56.341638 systemd[1]: sshd@16-10.244.9.98:22-139.178.89.65:42520.service: Deactivated successfully. Sep 6 00:31:56.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.9.98:22-139.178.89.65:42520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:31:56.344551 systemd[1]: session-17.scope: Deactivated successfully. Sep 6 00:31:56.350077 systemd-logind[1185]: Session 17 logged out. Waiting for processes to exit. Sep 6 00:31:56.356384 systemd-logind[1185]: Removed session 17. Sep 6 00:32:01.468472 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 6 00:32:01.493776 kernel: audit: type=1130 audit(1757118721.460:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.9.98:22-139.178.89.65:53730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:01.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.9.98:22-139.178.89.65:53730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:01.460067 systemd[1]: Started sshd@17-10.244.9.98:22-139.178.89.65:53730.service. Sep 6 00:32:02.604439 sshd[5618]: Accepted publickey for core from 139.178.89.65 port 53730 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:02.642517 kernel: audit: type=1101 audit(1757118722.603:1566): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.642893 kernel: audit: type=1103 audit(1757118722.612:1567): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.643638 kernel: audit: type=1006 audit(1757118722.613:1568): pid=5618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Sep 6 00:32:02.643718 kernel: audit: type=1300 audit(1757118722.613:1568): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc91a498d0 a2=3 a3=0 items=0 ppid=1 pid=5618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:02.643794 kernel: audit: type=1327 audit(1757118722.613:1568): proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:02.603000 audit[5618]: USER_ACCT pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.612000 audit[5618]: CRED_ACQ pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.613000 audit[5618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc91a498d0 a2=3 a3=0 items=0 ppid=1 pid=5618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:02.613000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:02.636525 sshd[5618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:02.678227 systemd-logind[1185]: New session 18 of user core. Sep 6 00:32:02.680908 systemd[1]: Started session-18.scope. Sep 6 00:32:02.691000 audit[5618]: USER_START pid=5618 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.692000 audit[5620]: CRED_ACQ pid=5620 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.706951 kernel: audit: type=1105 audit(1757118722.691:1569): pid=5618 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:02.707234 kernel: audit: type=1103 audit(1757118722.692:1570): pid=5620 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:03.460000 audit[4718]: AVC avc: denied { watch } for pid=4718 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.3148096994/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c707 tclass=file permissive=0 Sep 6 00:32:03.471330 kernel: audit: type=1400 audit(1757118723.460:1571): avc: denied { watch } for pid=4718 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_00_29_24.3148096994/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c398,c707 tclass=file permissive=0 Sep 6 00:32:03.460000 audit[4718]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022b1a60 a2=fc6 a3=0 items=0 ppid=4216 pid=4718 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 key=(null) Sep 6 00:32:03.483305 kernel: audit: type=1300 audit(1757118723.460:1571): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022b1a60 a2=fc6 a3=0 items=0 ppid=4216 pid=4718 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c398,c707 key=(null) Sep 6 00:32:03.460000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 00:32:04.404741 sshd[5618]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:04.432000 audit[5618]: USER_END pid=5618 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:04.433000 audit[5618]: CRED_DISP pid=5618 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:04.444238 systemd[1]: sshd@17-10.244.9.98:22-139.178.89.65:53730.service: Deactivated successfully. Sep 6 00:32:04.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.9.98:22-139.178.89.65:53730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:04.449191 systemd[1]: session-18.scope: Deactivated successfully. Sep 6 00:32:04.452535 systemd-logind[1185]: Session 18 logged out. Waiting for processes to exit. Sep 6 00:32:04.457033 systemd-logind[1185]: Removed session 18. Sep 6 00:32:04.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.9.98:22-139.178.89.65:53740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:04.572410 systemd[1]: Started sshd@18-10.244.9.98:22-139.178.89.65:53740.service. Sep 6 00:32:05.620000 audit[5629]: USER_ACCT pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:05.623524 sshd[5629]: Accepted publickey for core from 139.178.89.65 port 53740 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:05.623000 audit[5629]: CRED_ACQ pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:05.623000 audit[5629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf10c4e00 a2=3 a3=0 items=0 ppid=1 pid=5629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:05.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:05.627881 sshd[5629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:05.660344 systemd-logind[1185]: New session 19 of user core. Sep 6 00:32:05.661728 systemd[1]: Started session-19.scope. Sep 6 00:32:05.672000 audit[5629]: USER_START pid=5629 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:05.685000 audit[5631]: CRED_ACQ pid=5631 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:07.240830 sshd[5629]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:07.263723 kernel: kauditd_printk_skb: 12 callbacks suppressed Sep 6 00:32:07.273773 kernel: audit: type=1106 audit(1757118727.242:1581): pid=5629 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:07.274826 kernel: audit: type=1104 audit(1757118727.242:1582): pid=5629 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:07.275571 kernel: audit: type=1131 audit(1757118727.250:1583): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.9.98:22-139.178.89.65:53740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:07.242000 audit[5629]: USER_END pid=5629 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:07.242000 audit[5629]: CRED_DISP pid=5629 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:07.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.9.98:22-139.178.89.65:53740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:07.252081 systemd[1]: sshd@18-10.244.9.98:22-139.178.89.65:53740.service: Deactivated successfully. Sep 6 00:32:07.253548 systemd[1]: session-19.scope: Deactivated successfully. Sep 6 00:32:07.255445 systemd-logind[1185]: Session 19 logged out. Waiting for processes to exit. Sep 6 00:32:07.256995 systemd-logind[1185]: Removed session 19. Sep 6 00:32:07.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.9.98:22-139.178.89.65:53750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:07.386134 systemd[1]: Started sshd@19-10.244.9.98:22-139.178.89.65:53750.service. Sep 6 00:32:07.394223 kernel: audit: type=1130 audit(1757118727.385:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.9.98:22-139.178.89.65:53750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:08.386000 audit[5638]: USER_ACCT pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:08.395139 kernel: audit: type=1101 audit(1757118728.386:1585): pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:08.395252 sshd[5638]: Accepted publickey for core from 139.178.89.65 port 53750 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:08.389000 audit[5638]: CRED_ACQ pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:08.402140 kernel: audit: type=1103 audit(1757118728.389:1586): pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:08.402561 sshd[5638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:08.407565 kernel: audit: type=1006 audit(1757118728.389:1587): pid=5638 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Sep 6 00:32:08.407698 kernel: audit: type=1300 audit(1757118728.389:1587): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf47e8630 a2=3 a3=0 items=0 ppid=1 pid=5638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:08.389000 audit[5638]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf47e8630 a2=3 a3=0 items=0 ppid=1 pid=5638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:08.389000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:08.418129 kernel: audit: type=1327 audit(1757118728.389:1587): proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:08.429165 systemd-logind[1185]: New session 20 of user core. Sep 6 00:32:08.430444 systemd[1]: Started session-20.scope. Sep 6 00:32:08.441000 audit[5638]: USER_START pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:08.469152 kernel: audit: type=1105 audit(1757118728.441:1588): pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:08.450000 audit[5640]: CRED_ACQ pid=5640 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:10.608000 audit[5650]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.608000 audit[5650]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff680e5f60 a2=0 a3=7fff680e5f4c items=0 ppid=2136 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.634000 audit[5650]: NETFILTER_CFG table=nat:136 family=2 entries=26 op=nft_register_rule pid=5650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.634000 audit[5650]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff680e5f60 a2=0 a3=0 items=0 ppid=2136 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.669000 audit[5652]: NETFILTER_CFG table=filter:137 family=2 entries=32 op=nft_register_rule pid=5652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.669000 audit[5652]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdcd02c120 a2=0 a3=7ffdcd02c10c items=0 ppid=2136 pid=5652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.681000 audit[5652]: NETFILTER_CFG table=nat:138 family=2 entries=26 op=nft_register_rule pid=5652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:10.681000 audit[5652]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffdcd02c120 a2=0 a3=0 items=0 ppid=2136 pid=5652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:10.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:10.706244 sshd[5638]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:10.815000 audit[5638]: USER_END pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:10.820000 audit[5638]: CRED_DISP pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:10.871906 systemd[1]: sshd@19-10.244.9.98:22-139.178.89.65:53750.service: Deactivated successfully. Sep 6 00:32:10.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.9.98:22-139.178.89.65:53750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:10.877752 systemd[1]: session-20.scope: Deactivated successfully. Sep 6 00:32:10.881368 systemd-logind[1185]: Session 20 logged out. Waiting for processes to exit. Sep 6 00:32:10.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.9.98:22-139.178.89.65:34166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:10.892971 systemd[1]: Started sshd@20-10.244.9.98:22-139.178.89.65:34166.service. Sep 6 00:32:10.903431 systemd-logind[1185]: Removed session 20. Sep 6 00:32:12.001000 audit[5655]: USER_ACCT pid=5655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:12.052033 sshd[5655]: Accepted publickey for core from 139.178.89.65 port 34166 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:12.071000 audit[5655]: CRED_ACQ pid=5655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:12.072000 audit[5655]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecc9ef950 a2=3 a3=0 items=0 ppid=1 pid=5655 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:12.072000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:12.078985 sshd[5655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:12.209430 systemd-logind[1185]: New session 21 of user core. Sep 6 00:32:12.231272 systemd[1]: Started session-21.scope. Sep 6 00:32:12.302000 audit[5655]: USER_START pid=5655 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:12.313045 kernel: kauditd_printk_skb: 22 callbacks suppressed Sep 6 00:32:12.320519 kernel: audit: type=1105 audit(1757118732.302:1601): pid=5655 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:12.345000 audit[5657]: CRED_ACQ pid=5657 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:12.354121 kernel: audit: type=1103 audit(1757118732.345:1602): pid=5657 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:13.347883 systemd[1]: run-containerd-runc-k8s.io-b9deb5abbbd39d374168a85429abed6f996752321cd7442e0e67efaacc77dfcb-runc.VIt12o.mount: Deactivated successfully. Sep 6 00:32:17.478889 kubelet[2027]: E0906 00:32:17.465848 2027 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="5.958s" Sep 6 00:32:19.974169 sshd[5655]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:20.116000 audit[5655]: USER_END pid=5655 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:20.139790 kernel: audit: type=1106 audit(1757118740.116:1603): pid=5655 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:20.151524 kernel: audit: type=1104 audit(1757118740.116:1604): pid=5655 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:20.116000 audit[5655]: CRED_DISP pid=5655 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:20.170297 systemd[1]: sshd@20-10.244.9.98:22-139.178.89.65:34166.service: Deactivated successfully. Sep 6 00:32:20.200066 kernel: audit: type=1131 audit(1757118740.172:1605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.9.98:22-139.178.89.65:34166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:20.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.9.98:22-139.178.89.65:34166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:20.211774 kernel: audit: type=1130 audit(1757118740.202:1606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.9.98:22-139.178.89.65:34182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:20.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.9.98:22-139.178.89.65:34182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:20.184958 systemd[1]: session-21.scope: Deactivated successfully. Sep 6 00:32:20.185457 systemd[1]: session-21.scope: Consumed 1.453s CPU time. Sep 6 00:32:20.188424 systemd-logind[1185]: Session 21 logged out. Waiting for processes to exit. Sep 6 00:32:20.202857 systemd[1]: Started sshd@21-10.244.9.98:22-139.178.89.65:34182.service. Sep 6 00:32:20.211281 systemd-logind[1185]: Removed session 21. Sep 6 00:32:21.310000 audit[5729]: USER_ACCT pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:21.369234 kernel: audit: type=1101 audit(1757118741.310:1607): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:21.369511 kernel: audit: type=1103 audit(1757118741.318:1608): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:21.369585 kernel: audit: type=1006 audit(1757118741.319:1609): pid=5729 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Sep 6 00:32:21.370182 kernel: audit: type=1300 audit(1757118741.319:1609): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d446660 a2=3 a3=0 items=0 ppid=1 pid=5729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:21.370260 kernel: audit: type=1327 audit(1757118741.319:1609): proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:21.318000 audit[5729]: CRED_ACQ pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:21.319000 audit[5729]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d446660 a2=3 a3=0 items=0 ppid=1 pid=5729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:21.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:21.392414 sshd[5729]: Accepted publickey for core from 139.178.89.65 port 34182 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:21.323919 sshd[5729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:21.421846 systemd-logind[1185]: New session 22 of user core. Sep 6 00:32:21.423956 systemd[1]: Started session-22.scope. Sep 6 00:32:21.452509 kernel: audit: type=1105 audit(1757118741.438:1610): pid=5729 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:21.438000 audit[5729]: USER_START pid=5729 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:21.438000 audit[5733]: CRED_ACQ pid=5733 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:24.051354 sshd[5729]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:24.125000 audit[5729]: USER_END pid=5729 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:24.126000 audit[5729]: CRED_DISP pid=5729 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:24.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.9.98:22-139.178.89.65:34182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:24.150379 systemd[1]: sshd@21-10.244.9.98:22-139.178.89.65:34182.service: Deactivated successfully. Sep 6 00:32:24.170694 systemd[1]: session-22.scope: Deactivated successfully. Sep 6 00:32:24.174590 systemd-logind[1185]: Session 22 logged out. Waiting for processes to exit. Sep 6 00:32:24.183852 systemd-logind[1185]: Removed session 22. Sep 6 00:32:26.148000 audit[5749]: NETFILTER_CFG table=filter:139 family=2 entries=20 op=nft_register_rule pid=5749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:26.179974 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 6 00:32:26.187691 kernel: audit: type=1325 audit(1757118746.148:1615): table=filter:139 family=2 entries=20 op=nft_register_rule pid=5749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:26.192611 kernel: audit: type=1300 audit(1757118746.148:1615): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff57f6d6c0 a2=0 a3=7fff57f6d6ac items=0 ppid=2136 pid=5749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:26.193173 kernel: audit: type=1327 audit(1757118746.148:1615): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:26.193260 kernel: audit: type=1325 audit(1757118746.169:1616): table=nat:140 family=2 entries=110 op=nft_register_chain pid=5749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:26.193724 kernel: audit: type=1300 audit(1757118746.169:1616): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff57f6d6c0 a2=0 a3=7fff57f6d6ac items=0 ppid=2136 pid=5749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:26.194171 kernel: audit: type=1327 audit(1757118746.169:1616): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:26.148000 audit[5749]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff57f6d6c0 a2=0 a3=7fff57f6d6ac items=0 ppid=2136 pid=5749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:26.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:26.169000 audit[5749]: NETFILTER_CFG table=nat:140 family=2 entries=110 op=nft_register_chain pid=5749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 00:32:26.169000 audit[5749]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7fff57f6d6c0 a2=0 a3=7fff57f6d6ac items=0 ppid=2136 pid=5749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:26.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 00:32:29.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.9.98:22-139.178.89.65:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:29.280129 kernel: audit: type=1130 audit(1757118749.217:1617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.9.98:22-139.178.89.65:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:29.216452 systemd[1]: Started sshd@22-10.244.9.98:22-139.178.89.65:56822.service. Sep 6 00:32:30.332000 audit[5752]: USER_ACCT pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:30.348821 kernel: audit: type=1101 audit(1757118750.332:1618): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:30.349645 kernel: audit: type=1103 audit(1757118750.345:1619): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:30.345000 audit[5752]: CRED_ACQ pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:30.350776 sshd[5752]: Accepted publickey for core from 139.178.89.65 port 56822 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:30.373854 kernel: audit: type=1006 audit(1757118750.345:1620): pid=5752 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Sep 6 00:32:30.345000 audit[5752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe61a071b0 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:30.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:30.362879 sshd[5752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:30.549580 systemd[1]: Started session-23.scope. Sep 6 00:32:30.550847 systemd-logind[1185]: New session 23 of user core. Sep 6 00:32:30.603000 audit[5752]: USER_START pid=5752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:30.608000 audit[5757]: CRED_ACQ pid=5757 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:32.315274 sshd[5752]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:32.409322 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 6 00:32:32.414962 kernel: audit: type=1106 audit(1757118752.356:1623): pid=5752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:32.417481 kernel: audit: type=1104 audit(1757118752.367:1624): pid=5752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:32.417599 kernel: audit: type=1131 audit(1757118752.380:1625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.9.98:22-139.178.89.65:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:32.356000 audit[5752]: USER_END pid=5752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:32.367000 audit[5752]: CRED_DISP pid=5752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:32.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.9.98:22-139.178.89.65:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:32.380472 systemd[1]: sshd@22-10.244.9.98:22-139.178.89.65:56822.service: Deactivated successfully. Sep 6 00:32:32.386697 systemd[1]: session-23.scope: Deactivated successfully. Sep 6 00:32:32.392131 systemd-logind[1185]: Session 23 logged out. Waiting for processes to exit. Sep 6 00:32:32.403890 systemd-logind[1185]: Removed session 23. Sep 6 00:32:36.258697 update_engine[1188]: I0906 00:32:36.255987 1188 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 6 00:32:36.258697 update_engine[1188]: I0906 00:32:36.258721 1188 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 6 00:32:36.267855 update_engine[1188]: I0906 00:32:36.267803 1188 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 6 00:32:36.275608 update_engine[1188]: I0906 00:32:36.275559 1188 omaha_request_params.cc:62] Current group set to lts Sep 6 00:32:36.284138 update_engine[1188]: I0906 00:32:36.283034 1188 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 6 00:32:36.284138 update_engine[1188]: I0906 00:32:36.283074 1188 update_attempter.cc:643] Scheduling an action processor start. Sep 6 00:32:36.284138 update_engine[1188]: I0906 00:32:36.283139 1188 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 6 00:32:36.290247 update_engine[1188]: I0906 00:32:36.289806 1188 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 6 00:32:36.290247 update_engine[1188]: I0906 00:32:36.289999 1188 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 6 00:32:36.290247 update_engine[1188]: I0906 00:32:36.290014 1188 omaha_request_action.cc:271] Request: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: Sep 6 00:32:36.290247 update_engine[1188]: I0906 00:32:36.290026 1188 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 6 00:32:36.372830 locksmithd[1236]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 6 00:32:36.374885 update_engine[1188]: I0906 00:32:36.373754 1188 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 6 00:32:36.375726 update_engine[1188]: I0906 00:32:36.375655 1188 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 6 00:32:36.388148 update_engine[1188]: E0906 00:32:36.387926 1188 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 6 00:32:36.400212 update_engine[1188]: I0906 00:32:36.399978 1188 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 6 00:32:37.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.9.98:22-139.178.89.65:47648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:37.553028 kernel: audit: type=1130 audit(1757118757.504:1626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.9.98:22-139.178.89.65:47648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:37.507674 systemd[1]: Started sshd@23-10.244.9.98:22-139.178.89.65:47648.service. Sep 6 00:32:38.570000 audit[5788]: USER_ACCT pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.582851 kernel: audit: type=1101 audit(1757118758.570:1627): pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.582976 kernel: audit: type=1103 audit(1757118758.581:1628): pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.581000 audit[5788]: CRED_ACQ pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.584236 sshd[5788]: Accepted publickey for core from 139.178.89.65 port 47648 ssh2: RSA SHA256:Sw8a149JbJBnpb9RHpWnXqtnC5gRSoBTmkCiSXsMrm4 Sep 6 00:32:38.594031 kernel: audit: type=1006 audit(1757118758.581:1629): pid=5788 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Sep 6 00:32:38.581000 audit[5788]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38cd0480 a2=3 a3=0 items=0 ppid=1 pid=5788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:38.607512 kernel: audit: type=1300 audit(1757118758.581:1629): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38cd0480 a2=3 a3=0 items=0 ppid=1 pid=5788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 00:32:38.607672 kernel: audit: type=1327 audit(1757118758.581:1629): proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:38.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 00:32:38.595188 sshd[5788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 00:32:38.691722 systemd-logind[1185]: New session 24 of user core. Sep 6 00:32:38.697586 systemd[1]: Started session-24.scope. Sep 6 00:32:38.725000 audit[5788]: USER_START pid=5788 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.746469 kernel: audit: type=1105 audit(1757118758.725:1630): pid=5788 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.746704 kernel: audit: type=1103 audit(1757118758.741:1631): pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:38.741000 audit[5790]: CRED_ACQ pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:39.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.9.98:22-64.226.104.126:6102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:39.528785 systemd[1]: Started sshd@24-10.244.9.98:22-64.226.104.126:6102.service. Sep 6 00:32:39.536138 kernel: audit: type=1130 audit(1757118759.528:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.9.98:22-64.226.104.126:6102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:39.813492 sshd[5799]: kex protocol error: type 20 seq 2 [preauth] Sep 6 00:32:39.814842 sshd[5799]: kex protocol error: type 30 seq 3 [preauth] Sep 6 00:32:39.845000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.854138 kernel: audit: type=1400 audit(1757118759.845:1633): avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.845000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c007534660 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:32:39.845000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:32:39.849000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.849000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c007b55800 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:32:39.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:32:39.853000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.853000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0121c52a0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:32:39.853000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:32:39.853000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.853000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0075346f0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:32:39.853000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:32:39.911000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.911000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0121c5ce0 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:32:39.911000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:32:39.911000 audit[1875]: AVC avc: denied { watch } for pid=1875 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:39.911000 audit[1875]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c007b55b00 a2=fc6 a3=0 items=0 ppid=1738 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c205,c846 key=(null) Sep 6 00:32:39.911000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E392E3938002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Sep 6 00:32:40.005000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:40.005000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 00:32:40.005000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0023a6270 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:32:40.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:32:40.005000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0035a31a0 a2=fc6 a3=0 items=0 ppid=1721 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c904 key=(null) Sep 6 00:32:40.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 00:32:41.460672 systemd[1]: run-containerd-runc-k8s.io-656ba654bd73e21c461d7cbef9f36d01a313d2cb67696428bcde4369734e4b81-runc.QW3wBW.mount: Deactivated successfully. Sep 6 00:32:41.520631 sshd[5799]: kex protocol error: type 20 seq 4 [preauth] Sep 6 00:32:41.520631 sshd[5799]: kex protocol error: type 30 seq 5 [preauth] Sep 6 00:32:41.839377 sshd[5788]: pam_unix(sshd:session): session closed for user core Sep 6 00:32:41.945000 audit[5788]: USER_END pid=5788 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:41.946000 audit[5788]: CRED_DISP pid=5788 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 00:32:41.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.9.98:22-139.178.89.65:47648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 00:32:41.978803 systemd[1]: sshd@23-10.244.9.98:22-139.178.89.65:47648.service: Deactivated successfully. Sep 6 00:32:41.982915 systemd[1]: session-24.scope: Deactivated successfully. Sep 6 00:32:42.000463 systemd-logind[1185]: Session 24 logged out. Waiting for processes to exit. Sep 6 00:32:42.078061 systemd-logind[1185]: Removed session 24. Sep 6 00:32:43.503524 sshd[5799]: kex protocol error: type 20 seq 6 [preauth] Sep 6 00:32:43.521044 sshd[5799]: kex protocol error: type 30 seq 7 [preauth]