Sep 6 01:49:16.059786 kernel: Linux version 5.15.190-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 5 22:53:38 -00 2025 Sep 6 01:49:16.059823 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:49:16.059842 kernel: BIOS-provided physical RAM map: Sep 6 01:49:16.059852 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 6 01:49:16.059861 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 6 01:49:16.059871 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 6 01:49:16.059881 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Sep 6 01:49:16.059891 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Sep 6 01:49:16.059901 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Sep 6 01:49:16.059910 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Sep 6 01:49:16.059924 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 6 01:49:16.059934 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 6 01:49:16.059943 kernel: NX (Execute Disable) protection: active Sep 6 01:49:16.059953 kernel: SMBIOS 2.8 present. Sep 6 01:49:16.059965 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.16.0-3.module_el8.7.0+3346+68867adb 04/01/2014 Sep 6 01:49:16.059976 kernel: Hypervisor detected: KVM Sep 6 01:49:16.059990 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 6 01:49:16.060000 kernel: kvm-clock: cpu 0, msr 4c19f001, primary cpu clock Sep 6 01:49:16.060016 kernel: kvm-clock: using sched offset of 5972538605 cycles Sep 6 01:49:16.060028 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 6 01:49:16.060038 kernel: tsc: Detected 2799.998 MHz processor Sep 6 01:49:16.060049 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 6 01:49:16.060060 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 6 01:49:16.060070 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Sep 6 01:49:16.060081 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 6 01:49:16.060096 kernel: Using GB pages for direct mapping Sep 6 01:49:16.060107 kernel: ACPI: Early table checksum verification disabled Sep 6 01:49:16.060117 kernel: ACPI: RSDP 0x00000000000F59E0 000014 (v00 BOCHS ) Sep 6 01:49:16.060128 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060138 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060149 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060159 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Sep 6 01:49:16.060169 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060180 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060194 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060205 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 6 01:49:16.060215 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Sep 6 01:49:16.060226 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Sep 6 01:49:16.060236 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Sep 6 01:49:16.060247 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Sep 6 01:49:16.060263 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Sep 6 01:49:16.060278 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Sep 6 01:49:16.060289 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Sep 6 01:49:16.060300 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 6 01:49:16.060311 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 6 01:49:16.060322 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 6 01:49:16.060333 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Sep 6 01:49:16.060344 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 6 01:49:16.060377 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Sep 6 01:49:16.060399 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 6 01:49:16.060410 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Sep 6 01:49:16.060421 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 6 01:49:16.060433 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Sep 6 01:49:16.060444 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 6 01:49:16.060455 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Sep 6 01:49:16.060466 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 6 01:49:16.060477 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Sep 6 01:49:16.060488 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 6 01:49:16.060503 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Sep 6 01:49:16.060519 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 6 01:49:16.060531 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 6 01:49:16.060542 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Sep 6 01:49:16.060553 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Sep 6 01:49:16.060564 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Sep 6 01:49:16.060576 kernel: Zone ranges: Sep 6 01:49:16.060615 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 6 01:49:16.060627 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Sep 6 01:49:16.060644 kernel: Normal empty Sep 6 01:49:16.060656 kernel: Movable zone start for each node Sep 6 01:49:16.060667 kernel: Early memory node ranges Sep 6 01:49:16.060678 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 6 01:49:16.060700 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Sep 6 01:49:16.060712 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Sep 6 01:49:16.060723 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 6 01:49:16.060734 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 6 01:49:16.060745 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Sep 6 01:49:16.060761 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 6 01:49:16.060772 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 6 01:49:16.060783 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 6 01:49:16.060794 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 6 01:49:16.060805 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 6 01:49:16.060816 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 6 01:49:16.060827 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 6 01:49:16.060838 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 6 01:49:16.060849 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 6 01:49:16.060864 kernel: TSC deadline timer available Sep 6 01:49:16.060876 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Sep 6 01:49:16.060887 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Sep 6 01:49:16.060898 kernel: Booting paravirtualized kernel on KVM Sep 6 01:49:16.060909 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 6 01:49:16.060920 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Sep 6 01:49:16.060931 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 6 01:49:16.060942 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 6 01:49:16.060953 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 6 01:49:16.060968 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Sep 6 01:49:16.060980 kernel: kvm-guest: PV spinlocks enabled Sep 6 01:49:16.060991 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 6 01:49:16.061002 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Sep 6 01:49:16.061013 kernel: Policy zone: DMA32 Sep 6 01:49:16.061025 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:49:16.061037 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 6 01:49:16.061048 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 6 01:49:16.061063 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 6 01:49:16.061074 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 6 01:49:16.061086 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 192524K reserved, 0K cma-reserved) Sep 6 01:49:16.061097 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 6 01:49:16.061109 kernel: Kernel/User page tables isolation: enabled Sep 6 01:49:16.061120 kernel: ftrace: allocating 34612 entries in 136 pages Sep 6 01:49:16.061131 kernel: ftrace: allocated 136 pages with 2 groups Sep 6 01:49:16.061142 kernel: rcu: Hierarchical RCU implementation. Sep 6 01:49:16.061153 kernel: rcu: RCU event tracing is enabled. Sep 6 01:49:16.061174 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 6 01:49:16.061186 kernel: Rude variant of Tasks RCU enabled. Sep 6 01:49:16.061201 kernel: Tracing variant of Tasks RCU enabled. Sep 6 01:49:16.061213 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 6 01:49:16.061224 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 6 01:49:16.061235 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Sep 6 01:49:16.061246 kernel: random: crng init done Sep 6 01:49:16.061270 kernel: Console: colour VGA+ 80x25 Sep 6 01:49:16.061282 kernel: printk: console [tty0] enabled Sep 6 01:49:16.061294 kernel: printk: console [ttyS0] enabled Sep 6 01:49:16.061305 kernel: ACPI: Core revision 20210730 Sep 6 01:49:16.061317 kernel: APIC: Switch to symmetric I/O mode setup Sep 6 01:49:16.061332 kernel: x2apic enabled Sep 6 01:49:16.061344 kernel: Switched APIC routing to physical x2apic. Sep 6 01:49:16.061356 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Sep 6 01:49:16.061368 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Sep 6 01:49:16.061380 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 6 01:49:16.061395 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 6 01:49:16.061407 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 6 01:49:16.061419 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 6 01:49:16.061430 kernel: Spectre V2 : Mitigation: Retpolines Sep 6 01:49:16.061441 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 6 01:49:16.061453 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Sep 6 01:49:16.061465 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 6 01:49:16.061476 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 6 01:49:16.061488 kernel: MDS: Mitigation: Clear CPU buffers Sep 6 01:49:16.061499 kernel: MMIO Stale Data: Unknown: No mitigations Sep 6 01:49:16.061514 kernel: SRBDS: Unknown: Dependent on hypervisor status Sep 6 01:49:16.061526 kernel: active return thunk: its_return_thunk Sep 6 01:49:16.061538 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 6 01:49:16.061550 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 6 01:49:16.061561 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 6 01:49:16.061573 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 6 01:49:16.069660 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 6 01:49:16.069717 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 6 01:49:16.069731 kernel: Freeing SMP alternatives memory: 32K Sep 6 01:49:16.069744 kernel: pid_max: default: 32768 minimum: 301 Sep 6 01:49:16.069755 kernel: LSM: Security Framework initializing Sep 6 01:49:16.069776 kernel: SELinux: Initializing. Sep 6 01:49:16.069788 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 01:49:16.069800 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 6 01:49:16.069813 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Sep 6 01:49:16.069825 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Sep 6 01:49:16.069837 kernel: signal: max sigframe size: 1776 Sep 6 01:49:16.069849 kernel: rcu: Hierarchical SRCU implementation. Sep 6 01:49:16.069861 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 6 01:49:16.069873 kernel: smp: Bringing up secondary CPUs ... Sep 6 01:49:16.069892 kernel: x86: Booting SMP configuration: Sep 6 01:49:16.069909 kernel: .... node #0, CPUs: #1 Sep 6 01:49:16.069922 kernel: kvm-clock: cpu 1, msr 4c19f041, secondary cpu clock Sep 6 01:49:16.069934 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 6 01:49:16.069946 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Sep 6 01:49:16.069957 kernel: smp: Brought up 1 node, 2 CPUs Sep 6 01:49:16.069969 kernel: smpboot: Max logical packages: 16 Sep 6 01:49:16.069981 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Sep 6 01:49:16.069994 kernel: devtmpfs: initialized Sep 6 01:49:16.070005 kernel: x86/mm: Memory block size: 128MB Sep 6 01:49:16.070018 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 6 01:49:16.070034 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 6 01:49:16.070046 kernel: pinctrl core: initialized pinctrl subsystem Sep 6 01:49:16.070058 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 6 01:49:16.070070 kernel: audit: initializing netlink subsys (disabled) Sep 6 01:49:16.070082 kernel: audit: type=2000 audit(1757123354.736:1): state=initialized audit_enabled=0 res=1 Sep 6 01:49:16.070094 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 6 01:49:16.070105 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 6 01:49:16.070117 kernel: cpuidle: using governor menu Sep 6 01:49:16.070129 kernel: ACPI: bus type PCI registered Sep 6 01:49:16.070145 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 6 01:49:16.070157 kernel: dca service started, version 1.12.1 Sep 6 01:49:16.070169 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Sep 6 01:49:16.070181 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Sep 6 01:49:16.070193 kernel: PCI: Using configuration type 1 for base access Sep 6 01:49:16.070205 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 6 01:49:16.070217 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 6 01:49:16.070229 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 6 01:49:16.070244 kernel: ACPI: Added _OSI(Module Device) Sep 6 01:49:16.070256 kernel: ACPI: Added _OSI(Processor Device) Sep 6 01:49:16.070268 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 6 01:49:16.070280 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 6 01:49:16.070292 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 6 01:49:16.070304 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 6 01:49:16.070316 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 6 01:49:16.070327 kernel: ACPI: Interpreter enabled Sep 6 01:49:16.070340 kernel: ACPI: PM: (supports S0 S5) Sep 6 01:49:16.070351 kernel: ACPI: Using IOAPIC for interrupt routing Sep 6 01:49:16.070367 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 6 01:49:16.070379 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Sep 6 01:49:16.070391 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 6 01:49:16.070675 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 6 01:49:16.070849 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 6 01:49:16.071000 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 6 01:49:16.071019 kernel: PCI host bridge to bus 0000:00 Sep 6 01:49:16.071197 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 6 01:49:16.071337 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 6 01:49:16.071474 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 6 01:49:16.071642 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Sep 6 01:49:16.071800 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 6 01:49:16.071938 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Sep 6 01:49:16.072099 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 6 01:49:16.072302 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Sep 6 01:49:16.072503 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Sep 6 01:49:16.072702 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Sep 6 01:49:16.072863 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Sep 6 01:49:16.073016 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Sep 6 01:49:16.073170 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 6 01:49:16.073352 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.073510 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Sep 6 01:49:16.073725 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.073882 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Sep 6 01:49:16.074064 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.074222 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Sep 6 01:49:16.074411 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.074568 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Sep 6 01:49:16.074763 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.074918 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Sep 6 01:49:16.075087 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.075243 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Sep 6 01:49:16.075429 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.075602 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Sep 6 01:49:16.075812 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Sep 6 01:49:16.075970 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Sep 6 01:49:16.076151 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Sep 6 01:49:16.076306 kernel: pci 0000:00:03.0: reg 0x10: [io 0xd0c0-0xd0df] Sep 6 01:49:16.076457 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Sep 6 01:49:16.079679 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Sep 6 01:49:16.079874 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Sep 6 01:49:16.080067 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Sep 6 01:49:16.080230 kernel: pci 0000:00:04.0: reg 0x10: [io 0xd000-0xd07f] Sep 6 01:49:16.080386 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Sep 6 01:49:16.080542 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Sep 6 01:49:16.080754 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Sep 6 01:49:16.080920 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Sep 6 01:49:16.081086 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Sep 6 01:49:16.081241 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xd0e0-0xd0ff] Sep 6 01:49:16.081394 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Sep 6 01:49:16.081558 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Sep 6 01:49:16.081744 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Sep 6 01:49:16.081964 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Sep 6 01:49:16.082130 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Sep 6 01:49:16.082287 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 01:49:16.082440 kernel: pci 0000:00:02.0: bridge window [io 0xc000-0xcfff] Sep 6 01:49:16.082605 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 01:49:16.082776 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:49:16.082980 kernel: pci_bus 0000:02: extended config space not accessible Sep 6 01:49:16.083179 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Sep 6 01:49:16.083352 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Sep 6 01:49:16.083517 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 01:49:16.083719 kernel: pci 0000:01:00.0: bridge window [io 0xc000-0xcfff] Sep 6 01:49:16.083883 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 01:49:16.084046 kernel: pci 0000:01:00.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:49:16.084235 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Sep 6 01:49:16.084396 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Sep 6 01:49:16.084554 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 01:49:16.084739 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 01:49:16.084897 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:49:16.085082 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Sep 6 01:49:16.085250 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Sep 6 01:49:16.085415 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 01:49:16.085571 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 01:49:16.085767 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:49:16.085924 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 01:49:16.086080 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 01:49:16.086235 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:49:16.086393 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 01:49:16.086546 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 01:49:16.090799 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:49:16.090970 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 01:49:16.091128 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 01:49:16.091283 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:49:16.091440 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 01:49:16.094629 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 01:49:16.094828 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:49:16.094993 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 01:49:16.095159 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 01:49:16.095314 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:49:16.095333 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 6 01:49:16.095346 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 6 01:49:16.095358 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 6 01:49:16.095370 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 6 01:49:16.095382 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Sep 6 01:49:16.095394 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Sep 6 01:49:16.095406 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Sep 6 01:49:16.095424 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Sep 6 01:49:16.095436 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Sep 6 01:49:16.095447 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Sep 6 01:49:16.095459 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Sep 6 01:49:16.095471 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Sep 6 01:49:16.095483 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Sep 6 01:49:16.095495 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Sep 6 01:49:16.095507 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Sep 6 01:49:16.095518 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Sep 6 01:49:16.095535 kernel: iommu: Default domain type: Translated Sep 6 01:49:16.095547 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 6 01:49:16.095757 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Sep 6 01:49:16.095913 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 6 01:49:16.096062 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Sep 6 01:49:16.096080 kernel: vgaarb: loaded Sep 6 01:49:16.096093 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 6 01:49:16.096105 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 6 01:49:16.096123 kernel: PTP clock support registered Sep 6 01:49:16.096135 kernel: PCI: Using ACPI for IRQ routing Sep 6 01:49:16.096147 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 6 01:49:16.096159 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 6 01:49:16.096171 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Sep 6 01:49:16.096182 kernel: clocksource: Switched to clocksource kvm-clock Sep 6 01:49:16.096194 kernel: VFS: Disk quotas dquot_6.6.0 Sep 6 01:49:16.096207 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 6 01:49:16.096219 kernel: pnp: PnP ACPI init Sep 6 01:49:16.096399 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Sep 6 01:49:16.096420 kernel: pnp: PnP ACPI: found 5 devices Sep 6 01:49:16.096432 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 6 01:49:16.096444 kernel: NET: Registered PF_INET protocol family Sep 6 01:49:16.096456 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 6 01:49:16.096468 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 6 01:49:16.096480 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 6 01:49:16.096493 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 6 01:49:16.096511 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 6 01:49:16.096524 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 6 01:49:16.096536 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 01:49:16.096548 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 6 01:49:16.096560 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 6 01:49:16.096572 kernel: NET: Registered PF_XDP protocol family Sep 6 01:49:16.096751 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Sep 6 01:49:16.096907 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Sep 6 01:49:16.097068 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Sep 6 01:49:16.097222 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 6 01:49:16.097375 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 6 01:49:16.097528 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 6 01:49:16.097709 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 6 01:49:16.097866 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x1000-0x1fff] Sep 6 01:49:16.098027 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x2000-0x2fff] Sep 6 01:49:16.098178 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x3000-0x3fff] Sep 6 01:49:16.098330 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x4000-0x4fff] Sep 6 01:49:16.098481 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x5000-0x5fff] Sep 6 01:49:16.098649 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x6000-0x6fff] Sep 6 01:49:16.098816 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x7000-0x7fff] Sep 6 01:49:16.098981 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Sep 6 01:49:16.099144 kernel: pci 0000:01:00.0: bridge window [io 0xc000-0xcfff] Sep 6 01:49:16.099312 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Sep 6 01:49:16.099472 kernel: pci 0000:01:00.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:49:16.103700 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Sep 6 01:49:16.103901 kernel: pci 0000:00:02.0: bridge window [io 0xc000-0xcfff] Sep 6 01:49:16.104065 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Sep 6 01:49:16.104224 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:49:16.104389 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Sep 6 01:49:16.104558 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x1fff] Sep 6 01:49:16.104746 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Sep 6 01:49:16.104905 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:49:16.105070 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Sep 6 01:49:16.105227 kernel: pci 0000:00:02.2: bridge window [io 0x2000-0x2fff] Sep 6 01:49:16.105386 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Sep 6 01:49:16.105541 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:49:16.105726 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Sep 6 01:49:16.105882 kernel: pci 0000:00:02.3: bridge window [io 0x3000-0x3fff] Sep 6 01:49:16.106038 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Sep 6 01:49:16.106213 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:49:16.106379 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Sep 6 01:49:16.106534 kernel: pci 0000:00:02.4: bridge window [io 0x4000-0x4fff] Sep 6 01:49:16.106730 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Sep 6 01:49:16.106891 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:49:16.107047 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Sep 6 01:49:16.107200 kernel: pci 0000:00:02.5: bridge window [io 0x5000-0x5fff] Sep 6 01:49:16.107364 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Sep 6 01:49:16.107526 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:49:16.111764 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Sep 6 01:49:16.111938 kernel: pci 0000:00:02.6: bridge window [io 0x6000-0x6fff] Sep 6 01:49:16.112104 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Sep 6 01:49:16.112272 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:49:16.112433 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Sep 6 01:49:16.112601 kernel: pci 0000:00:02.7: bridge window [io 0x7000-0x7fff] Sep 6 01:49:16.112777 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Sep 6 01:49:16.112936 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:49:16.113108 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 6 01:49:16.113259 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 6 01:49:16.113412 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 6 01:49:16.113551 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Sep 6 01:49:16.113729 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Sep 6 01:49:16.113875 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Sep 6 01:49:16.114079 kernel: pci_bus 0000:01: resource 0 [io 0xc000-0xcfff] Sep 6 01:49:16.114232 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Sep 6 01:49:16.114381 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:49:16.114543 kernel: pci_bus 0000:02: resource 0 [io 0xc000-0xcfff] Sep 6 01:49:16.114728 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Sep 6 01:49:16.114893 kernel: pci_bus 0000:02: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Sep 6 01:49:16.115066 kernel: pci_bus 0000:03: resource 0 [io 0x1000-0x1fff] Sep 6 01:49:16.115219 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Sep 6 01:49:16.115369 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Sep 6 01:49:16.115545 kernel: pci_bus 0000:04: resource 0 [io 0x2000-0x2fff] Sep 6 01:49:16.123716 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Sep 6 01:49:16.123900 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Sep 6 01:49:16.124095 kernel: pci_bus 0000:05: resource 0 [io 0x3000-0x3fff] Sep 6 01:49:16.124248 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Sep 6 01:49:16.124400 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Sep 6 01:49:16.124564 kernel: pci_bus 0000:06: resource 0 [io 0x4000-0x4fff] Sep 6 01:49:16.124747 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Sep 6 01:49:16.124899 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Sep 6 01:49:16.125072 kernel: pci_bus 0000:07: resource 0 [io 0x5000-0x5fff] Sep 6 01:49:16.125242 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Sep 6 01:49:16.125398 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Sep 6 01:49:16.125601 kernel: pci_bus 0000:08: resource 0 [io 0x6000-0x6fff] Sep 6 01:49:16.125771 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Sep 6 01:49:16.125924 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Sep 6 01:49:16.126095 kernel: pci_bus 0000:09: resource 0 [io 0x7000-0x7fff] Sep 6 01:49:16.126255 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Sep 6 01:49:16.126414 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Sep 6 01:49:16.126433 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Sep 6 01:49:16.126446 kernel: PCI: CLS 0 bytes, default 64 Sep 6 01:49:16.126459 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 6 01:49:16.126471 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Sep 6 01:49:16.126483 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 6 01:49:16.126501 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Sep 6 01:49:16.126514 kernel: Initialise system trusted keyrings Sep 6 01:49:16.126526 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 6 01:49:16.126538 kernel: Key type asymmetric registered Sep 6 01:49:16.126550 kernel: Asymmetric key parser 'x509' registered Sep 6 01:49:16.126562 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 6 01:49:16.126574 kernel: io scheduler mq-deadline registered Sep 6 01:49:16.126586 kernel: io scheduler kyber registered Sep 6 01:49:16.126620 kernel: io scheduler bfq registered Sep 6 01:49:16.126815 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Sep 6 01:49:16.126976 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Sep 6 01:49:16.127131 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.127303 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Sep 6 01:49:16.127455 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Sep 6 01:49:16.127628 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.127815 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Sep 6 01:49:16.127982 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Sep 6 01:49:16.128138 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.128296 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Sep 6 01:49:16.128448 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Sep 6 01:49:16.128625 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.128798 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Sep 6 01:49:16.128962 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Sep 6 01:49:16.129119 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.129277 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Sep 6 01:49:16.129433 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Sep 6 01:49:16.129598 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.129771 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Sep 6 01:49:16.129935 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Sep 6 01:49:16.130091 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.130248 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Sep 6 01:49:16.130405 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Sep 6 01:49:16.130560 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Sep 6 01:49:16.130580 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 6 01:49:16.135168 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Sep 6 01:49:16.135188 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Sep 6 01:49:16.135202 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 6 01:49:16.135215 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 6 01:49:16.135227 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 6 01:49:16.135240 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 6 01:49:16.135253 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 6 01:49:16.135266 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 6 01:49:16.135480 kernel: rtc_cmos 00:03: RTC can wake from S4 Sep 6 01:49:16.135664 kernel: rtc_cmos 00:03: registered as rtc0 Sep 6 01:49:16.135830 kernel: rtc_cmos 00:03: setting system clock to 2025-09-06T01:49:15 UTC (1757123355) Sep 6 01:49:16.135979 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Sep 6 01:49:16.135998 kernel: intel_pstate: CPU model not supported Sep 6 01:49:16.136011 kernel: NET: Registered PF_INET6 protocol family Sep 6 01:49:16.136024 kernel: Segment Routing with IPv6 Sep 6 01:49:16.136036 kernel: In-situ OAM (IOAM) with IPv6 Sep 6 01:49:16.136049 kernel: NET: Registered PF_PACKET protocol family Sep 6 01:49:16.136068 kernel: Key type dns_resolver registered Sep 6 01:49:16.136081 kernel: IPI shorthand broadcast: enabled Sep 6 01:49:16.136094 kernel: sched_clock: Marking stable (1011852209, 212281275)->(1520872048, -296738564) Sep 6 01:49:16.136107 kernel: registered taskstats version 1 Sep 6 01:49:16.136119 kernel: Loading compiled-in X.509 certificates Sep 6 01:49:16.136132 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.190-flatcar: 59a3efd48c75422889eb056cb9758fbe471623cb' Sep 6 01:49:16.136144 kernel: Key type .fscrypt registered Sep 6 01:49:16.136156 kernel: Key type fscrypt-provisioning registered Sep 6 01:49:16.136169 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 6 01:49:16.136186 kernel: ima: Allocated hash algorithm: sha1 Sep 6 01:49:16.136198 kernel: ima: No architecture policies found Sep 6 01:49:16.136211 kernel: clk: Disabling unused clocks Sep 6 01:49:16.136223 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 6 01:49:16.136236 kernel: Write protecting the kernel read-only data: 28672k Sep 6 01:49:16.136248 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 6 01:49:16.136261 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 6 01:49:16.136274 kernel: Run /init as init process Sep 6 01:49:16.136287 kernel: with arguments: Sep 6 01:49:16.136303 kernel: /init Sep 6 01:49:16.136315 kernel: with environment: Sep 6 01:49:16.136327 kernel: HOME=/ Sep 6 01:49:16.136339 kernel: TERM=linux Sep 6 01:49:16.136351 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 6 01:49:16.136367 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:49:16.136386 systemd[1]: Detected virtualization kvm. Sep 6 01:49:16.136400 systemd[1]: Detected architecture x86-64. Sep 6 01:49:16.136417 systemd[1]: Running in initrd. Sep 6 01:49:16.136430 systemd[1]: No hostname configured, using default hostname. Sep 6 01:49:16.136443 systemd[1]: Hostname set to . Sep 6 01:49:16.136456 systemd[1]: Initializing machine ID from VM UUID. Sep 6 01:49:16.136469 systemd[1]: Queued start job for default target initrd.target. Sep 6 01:49:16.136482 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:49:16.136495 systemd[1]: Reached target cryptsetup.target. Sep 6 01:49:16.136507 systemd[1]: Reached target paths.target. Sep 6 01:49:16.136524 systemd[1]: Reached target slices.target. Sep 6 01:49:16.136537 systemd[1]: Reached target swap.target. Sep 6 01:49:16.136554 systemd[1]: Reached target timers.target. Sep 6 01:49:16.136568 systemd[1]: Listening on iscsid.socket. Sep 6 01:49:16.136581 systemd[1]: Listening on iscsiuio.socket. Sep 6 01:49:16.136607 systemd[1]: Listening on systemd-journald-audit.socket. Sep 6 01:49:16.136621 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 6 01:49:16.136639 systemd[1]: Listening on systemd-journald.socket. Sep 6 01:49:16.136652 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:49:16.136665 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:49:16.136679 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:49:16.136705 systemd[1]: Reached target sockets.target. Sep 6 01:49:16.136718 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:49:16.136731 systemd[1]: Finished network-cleanup.service. Sep 6 01:49:16.136744 systemd[1]: Starting systemd-fsck-usr.service... Sep 6 01:49:16.136757 systemd[1]: Starting systemd-journald.service... Sep 6 01:49:16.136775 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:49:16.136789 systemd[1]: Starting systemd-resolved.service... Sep 6 01:49:16.136802 systemd[1]: Starting systemd-vconsole-setup.service... Sep 6 01:49:16.136815 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:49:16.136828 systemd[1]: Finished systemd-fsck-usr.service. Sep 6 01:49:16.136841 systemd[1]: Started systemd-resolved.service. Sep 6 01:49:16.136854 kernel: audit: type=1130 audit(1757123356.132:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.136873 systemd-journald[202]: Journal started Sep 6 01:49:16.136948 systemd-journald[202]: Runtime Journal (/run/log/journal/aada02349f9d49e2a4aa6729a995f03f) is 4.7M, max 38.1M, 33.3M free. Sep 6 01:49:16.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.062693 systemd-modules-load[203]: Inserted module 'overlay' Sep 6 01:49:16.155817 systemd[1]: Started systemd-journald.service. Sep 6 01:49:16.155861 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 6 01:49:16.155881 kernel: audit: type=1130 audit(1757123356.140:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.155909 kernel: audit: type=1130 audit(1757123356.150:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.084359 systemd-resolved[204]: Positive Trust Anchors: Sep 6 01:49:16.162763 kernel: audit: type=1130 audit(1757123356.156:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.084375 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:49:16.167514 kernel: Bridge firewalling registered Sep 6 01:49:16.084413 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:49:16.087534 systemd-resolved[204]: Defaulting to hostname 'linux'. Sep 6 01:49:16.150966 systemd[1]: Finished systemd-vconsole-setup.service. Sep 6 01:49:16.156956 systemd[1]: Reached target nss-lookup.target. Sep 6 01:49:16.164086 systemd-modules-load[203]: Inserted module 'br_netfilter' Sep 6 01:49:16.165764 systemd[1]: Starting dracut-cmdline-ask.service... Sep 6 01:49:16.170837 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:49:16.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.182963 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:49:16.189013 kernel: audit: type=1130 audit(1757123356.183:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.239621 kernel: audit: type=1130 audit(1757123356.191:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.191745 systemd[1]: Finished dracut-cmdline-ask.service. Sep 6 01:49:16.238354 systemd[1]: Starting dracut-cmdline.service... Sep 6 01:49:16.249641 kernel: SCSI subsystem initialized Sep 6 01:49:16.254457 dracut-cmdline[218]: dracut-dracut-053 Sep 6 01:49:16.258207 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=a807e3b6c1f608bcead7858f1ad5b6908e6d312e2d99c0ec0e5454f978e611a7 Sep 6 01:49:16.268605 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 6 01:49:16.268648 kernel: device-mapper: uevent: version 1.0.3 Sep 6 01:49:16.270752 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 6 01:49:16.274927 systemd-modules-load[203]: Inserted module 'dm_multipath' Sep 6 01:49:16.298277 kernel: audit: type=1130 audit(1757123356.290:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.290041 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:49:16.292016 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:49:16.305760 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:49:16.312013 kernel: audit: type=1130 audit(1757123356.305:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.355649 kernel: Loading iSCSI transport class v2.0-870. Sep 6 01:49:16.375624 kernel: iscsi: registered transport (tcp) Sep 6 01:49:16.403574 kernel: iscsi: registered transport (qla4xxx) Sep 6 01:49:16.403700 kernel: QLogic iSCSI HBA Driver Sep 6 01:49:16.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.452742 systemd[1]: Finished dracut-cmdline.service. Sep 6 01:49:16.454557 systemd[1]: Starting dracut-pre-udev.service... Sep 6 01:49:16.461155 kernel: audit: type=1130 audit(1757123356.452:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.511664 kernel: raid6: sse2x4 gen() 14440 MB/s Sep 6 01:49:16.529750 kernel: raid6: sse2x4 xor() 8143 MB/s Sep 6 01:49:16.547663 kernel: raid6: sse2x2 gen() 9996 MB/s Sep 6 01:49:16.565654 kernel: raid6: sse2x2 xor() 8394 MB/s Sep 6 01:49:16.583749 kernel: raid6: sse2x1 gen() 10045 MB/s Sep 6 01:49:16.602242 kernel: raid6: sse2x1 xor() 7444 MB/s Sep 6 01:49:16.602292 kernel: raid6: using algorithm sse2x4 gen() 14440 MB/s Sep 6 01:49:16.602310 kernel: raid6: .... xor() 8143 MB/s, rmw enabled Sep 6 01:49:16.603598 kernel: raid6: using ssse3x2 recovery algorithm Sep 6 01:49:16.619617 kernel: xor: automatically using best checksumming function avx Sep 6 01:49:16.731632 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 6 01:49:16.744497 systemd[1]: Finished dracut-pre-udev.service. Sep 6 01:49:16.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.745000 audit: BPF prog-id=7 op=LOAD Sep 6 01:49:16.745000 audit: BPF prog-id=8 op=LOAD Sep 6 01:49:16.746443 systemd[1]: Starting systemd-udevd.service... Sep 6 01:49:16.763681 systemd-udevd[402]: Using default interface naming scheme 'v252'. Sep 6 01:49:16.772266 systemd[1]: Started systemd-udevd.service. Sep 6 01:49:16.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.774214 systemd[1]: Starting dracut-pre-trigger.service... Sep 6 01:49:16.790454 dracut-pre-trigger[403]: rd.md=0: removing MD RAID activation Sep 6 01:49:16.831258 systemd[1]: Finished dracut-pre-trigger.service. Sep 6 01:49:16.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:16.833093 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:49:16.925950 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:49:16.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:17.034609 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Sep 6 01:49:17.073940 kernel: ACPI: bus type USB registered Sep 6 01:49:17.073966 kernel: usbcore: registered new interface driver usbfs Sep 6 01:49:17.073983 kernel: cryptd: max_cpu_qlen set to 1000 Sep 6 01:49:17.074000 kernel: usbcore: registered new interface driver hub Sep 6 01:49:17.074016 kernel: usbcore: registered new device driver usb Sep 6 01:49:17.074032 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 6 01:49:17.074058 kernel: GPT:17805311 != 125829119 Sep 6 01:49:17.074075 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 6 01:49:17.074090 kernel: GPT:17805311 != 125829119 Sep 6 01:49:17.074106 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 6 01:49:17.074122 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:49:17.107614 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (452) Sep 6 01:49:17.113432 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 6 01:49:17.115317 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 6 01:49:17.118624 kernel: AVX version of gcm_enc/dec engaged. Sep 6 01:49:17.119104 systemd[1]: Starting disk-uuid.service... Sep 6 01:49:17.130418 disk-uuid[467]: Primary Header is updated. Sep 6 01:49:17.130418 disk-uuid[467]: Secondary Entries is updated. Sep 6 01:49:17.130418 disk-uuid[467]: Secondary Header is updated. Sep 6 01:49:17.138461 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 6 01:49:17.147638 kernel: AES CTR mode by8 optimization enabled Sep 6 01:49:17.149875 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 6 01:49:17.152610 kernel: libata version 3.00 loaded. Sep 6 01:49:17.163619 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 01:49:17.175571 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Sep 6 01:49:17.175810 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Sep 6 01:49:17.175987 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Sep 6 01:49:17.176163 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Sep 6 01:49:17.176342 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Sep 6 01:49:17.176513 kernel: hub 1-0:1.0: USB hub found Sep 6 01:49:17.176772 kernel: hub 1-0:1.0: 4 ports detected Sep 6 01:49:17.176968 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Sep 6 01:49:17.177193 kernel: hub 2-0:1.0: USB hub found Sep 6 01:49:17.177392 kernel: hub 2-0:1.0: 4 ports detected Sep 6 01:49:17.172374 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:49:17.317733 kernel: ahci 0000:00:1f.2: version 3.0 Sep 6 01:49:17.317973 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Sep 6 01:49:17.317995 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Sep 6 01:49:17.318171 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Sep 6 01:49:17.318371 kernel: scsi host0: ahci Sep 6 01:49:17.318575 kernel: scsi host1: ahci Sep 6 01:49:17.318808 kernel: scsi host2: ahci Sep 6 01:49:17.319008 kernel: scsi host3: ahci Sep 6 01:49:17.319274 kernel: scsi host4: ahci Sep 6 01:49:17.319462 kernel: scsi host5: ahci Sep 6 01:49:17.319709 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 41 Sep 6 01:49:17.319728 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 41 Sep 6 01:49:17.319744 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 41 Sep 6 01:49:17.319760 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 41 Sep 6 01:49:17.319782 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 41 Sep 6 01:49:17.319798 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 41 Sep 6 01:49:17.409724 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Sep 6 01:49:17.543419 kernel: ata1: SATA link down (SStatus 0 SControl 300) Sep 6 01:49:17.543499 kernel: ata2: SATA link down (SStatus 0 SControl 300) Sep 6 01:49:17.551878 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 6 01:49:17.551917 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 6 01:49:17.553894 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 6 01:49:17.553942 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 6 01:49:17.556614 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 6 01:49:17.573701 kernel: usbcore: registered new interface driver usbhid Sep 6 01:49:17.573754 kernel: usbhid: USB HID core driver Sep 6 01:49:17.582752 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Sep 6 01:49:17.582804 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Sep 6 01:49:18.142343 disk-uuid[468]: The operation has completed successfully. Sep 6 01:49:18.143430 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 6 01:49:18.198437 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 6 01:49:18.198628 systemd[1]: Finished disk-uuid.service. Sep 6 01:49:18.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.204947 systemd[1]: Starting verity-setup.service... Sep 6 01:49:18.226933 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Sep 6 01:49:18.281530 systemd[1]: Found device dev-mapper-usr.device. Sep 6 01:49:18.284424 systemd[1]: Mounting sysusr-usr.mount... Sep 6 01:49:18.286130 systemd[1]: Finished verity-setup.service. Sep 6 01:49:18.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.380618 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 6 01:49:18.380822 systemd[1]: Mounted sysusr-usr.mount. Sep 6 01:49:18.381666 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 6 01:49:18.382675 systemd[1]: Starting ignition-setup.service... Sep 6 01:49:18.385173 systemd[1]: Starting parse-ip-for-networkd.service... Sep 6 01:49:18.401473 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 01:49:18.401546 kernel: BTRFS info (device vda6): using free space tree Sep 6 01:49:18.401577 kernel: BTRFS info (device vda6): has skinny extents Sep 6 01:49:18.422195 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 6 01:49:18.430850 systemd[1]: Finished ignition-setup.service. Sep 6 01:49:18.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.432901 systemd[1]: Starting ignition-fetch-offline.service... Sep 6 01:49:18.540490 systemd[1]: Finished parse-ip-for-networkd.service. Sep 6 01:49:18.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.541000 audit: BPF prog-id=9 op=LOAD Sep 6 01:49:18.543138 systemd[1]: Starting systemd-networkd.service... Sep 6 01:49:18.576259 systemd-networkd[709]: lo: Link UP Sep 6 01:49:18.576274 systemd-networkd[709]: lo: Gained carrier Sep 6 01:49:18.577247 systemd-networkd[709]: Enumeration completed Sep 6 01:49:18.577699 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:49:18.579382 systemd-networkd[709]: eth0: Link UP Sep 6 01:49:18.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.579388 systemd-networkd[709]: eth0: Gained carrier Sep 6 01:49:18.579953 systemd[1]: Started systemd-networkd.service. Sep 6 01:49:18.595732 systemd[1]: Reached target network.target. Sep 6 01:49:18.598814 systemd[1]: Starting iscsiuio.service... Sep 6 01:49:18.626142 ignition[631]: Ignition 2.14.0 Sep 6 01:49:18.627406 ignition[631]: Stage: fetch-offline Sep 6 01:49:18.628212 ignition[631]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:18.629163 ignition[631]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:18.631092 ignition[631]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:18.632179 ignition[631]: parsed url from cmdline: "" Sep 6 01:49:18.632271 ignition[631]: no config URL provided Sep 6 01:49:18.632978 ignition[631]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:49:18.633861 ignition[631]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:49:18.634676 ignition[631]: failed to fetch config: resource requires networking Sep 6 01:49:18.635811 ignition[631]: Ignition finished successfully Sep 6 01:49:18.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.637690 systemd[1]: Finished ignition-fetch-offline.service. Sep 6 01:49:18.639530 systemd[1]: Starting ignition-fetch.service... Sep 6 01:49:18.640878 systemd-networkd[709]: eth0: DHCPv4 address 10.243.73.226/30, gateway 10.243.73.225 acquired from 10.243.73.225 Sep 6 01:49:18.658742 ignition[714]: Ignition 2.14.0 Sep 6 01:49:18.659791 ignition[714]: Stage: fetch Sep 6 01:49:18.659961 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:18.659997 ignition[714]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:18.661279 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:18.663808 ignition[714]: parsed url from cmdline: "" Sep 6 01:49:18.663820 ignition[714]: no config URL provided Sep 6 01:49:18.663831 ignition[714]: reading system config file "/usr/lib/ignition/user.ign" Sep 6 01:49:18.663850 ignition[714]: no config at "/usr/lib/ignition/user.ign" Sep 6 01:49:18.672557 ignition[714]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Sep 6 01:49:18.672634 ignition[714]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Sep 6 01:49:18.673766 ignition[714]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Sep 6 01:49:18.699215 systemd[1]: Started iscsiuio.service. Sep 6 01:49:18.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.701538 systemd[1]: Starting iscsid.service... Sep 6 01:49:18.707873 iscsid[720]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:49:18.707873 iscsid[720]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 6 01:49:18.707873 iscsid[720]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 6 01:49:18.707873 iscsid[720]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 6 01:49:18.713482 iscsid[720]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 6 01:49:18.713482 iscsid[720]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 6 01:49:18.711637 ignition[714]: GET result: OK Sep 6 01:49:18.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.714558 systemd[1]: Started iscsid.service. Sep 6 01:49:18.711844 ignition[714]: parsing config with SHA512: bc0e110098d892d9ab54c0d02dcef519bc7c402a7b4c04a4f2dae950724261e564d71d5a37f0535246c394a4034449b95589c076156e04f9128ffbc5c3c36815 Sep 6 01:49:18.720015 systemd[1]: Starting dracut-initqueue.service... Sep 6 01:49:18.867643 unknown[714]: fetched base config from "system" Sep 6 01:49:18.867665 unknown[714]: fetched base config from "system" Sep 6 01:49:18.868435 ignition[714]: fetch: fetch complete Sep 6 01:49:18.867675 unknown[714]: fetched user config from "openstack" Sep 6 01:49:18.868446 ignition[714]: fetch: fetch passed Sep 6 01:49:18.868526 ignition[714]: Ignition finished successfully Sep 6 01:49:18.871375 systemd[1]: Finished ignition-fetch.service. Sep 6 01:49:18.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.874254 systemd[1]: Starting ignition-kargs.service... Sep 6 01:49:18.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.879895 systemd[1]: Finished dracut-initqueue.service. Sep 6 01:49:18.880728 systemd[1]: Reached target remote-fs-pre.target. Sep 6 01:49:18.881319 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:49:18.881967 systemd[1]: Reached target remote-fs.target. Sep 6 01:49:18.883545 systemd[1]: Starting dracut-pre-mount.service... Sep 6 01:49:18.896494 systemd[1]: Finished dracut-pre-mount.service. Sep 6 01:49:18.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.906000 ignition[728]: Ignition 2.14.0 Sep 6 01:49:18.907033 ignition[728]: Stage: kargs Sep 6 01:49:18.907879 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:18.908810 ignition[728]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:18.909938 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:18.911927 ignition[728]: kargs: kargs passed Sep 6 01:49:18.912678 ignition[728]: Ignition finished successfully Sep 6 01:49:18.914488 systemd[1]: Finished ignition-kargs.service. Sep 6 01:49:18.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.916381 systemd[1]: Starting ignition-disks.service... Sep 6 01:49:18.932302 ignition[741]: Ignition 2.14.0 Sep 6 01:49:18.932323 ignition[741]: Stage: disks Sep 6 01:49:18.932536 ignition[741]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:18.932573 ignition[741]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:18.934255 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:18.936298 ignition[741]: disks: disks passed Sep 6 01:49:18.936397 ignition[741]: Ignition finished successfully Sep 6 01:49:18.938780 systemd[1]: Finished ignition-disks.service. Sep 6 01:49:18.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.939912 systemd[1]: Reached target initrd-root-device.target. Sep 6 01:49:18.940754 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:49:18.942012 systemd[1]: Reached target local-fs.target. Sep 6 01:49:18.943162 systemd[1]: Reached target sysinit.target. Sep 6 01:49:18.944353 systemd[1]: Reached target basic.target. Sep 6 01:49:18.947003 systemd[1]: Starting systemd-fsck-root.service... Sep 6 01:49:18.971652 systemd-fsck[748]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 6 01:49:18.980989 systemd[1]: Finished systemd-fsck-root.service. Sep 6 01:49:18.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:18.982676 systemd[1]: Mounting sysroot.mount... Sep 6 01:49:18.994629 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 6 01:49:18.994905 systemd[1]: Mounted sysroot.mount. Sep 6 01:49:18.996300 systemd[1]: Reached target initrd-root-fs.target. Sep 6 01:49:18.999293 systemd[1]: Mounting sysroot-usr.mount... Sep 6 01:49:19.001190 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 6 01:49:19.003189 systemd[1]: Starting flatcar-openstack-hostname.service... Sep 6 01:49:19.004725 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 6 01:49:19.005828 systemd[1]: Reached target ignition-diskful.target. Sep 6 01:49:19.008505 systemd[1]: Mounted sysroot-usr.mount. Sep 6 01:49:19.010816 systemd[1]: Starting initrd-setup-root.service... Sep 6 01:49:19.019174 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Sep 6 01:49:19.037530 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Sep 6 01:49:19.049886 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Sep 6 01:49:19.058336 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Sep 6 01:49:19.122412 systemd[1]: Finished initrd-setup-root.service. Sep 6 01:49:19.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:19.127224 systemd[1]: Starting ignition-mount.service... Sep 6 01:49:19.135161 systemd[1]: Starting sysroot-boot.service... Sep 6 01:49:19.142078 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Sep 6 01:49:19.148733 coreos-metadata[754]: Sep 06 01:49:19.148 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Sep 6 01:49:19.159950 ignition[803]: INFO : Ignition 2.14.0 Sep 6 01:49:19.160959 ignition[803]: INFO : Stage: mount Sep 6 01:49:19.161843 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:19.163041 coreos-metadata[754]: Sep 06 01:49:19.162 INFO Fetch successful Sep 6 01:49:19.163794 coreos-metadata[754]: Sep 06 01:49:19.163 INFO wrote hostname srv-lvab0.gb1.brightbox.com to /sysroot/etc/hostname Sep 6 01:49:19.165084 ignition[803]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:19.166422 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:19.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:19.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:19.168828 ignition[803]: INFO : mount: mount passed Sep 6 01:49:19.168828 ignition[803]: INFO : Ignition finished successfully Sep 6 01:49:19.167676 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Sep 6 01:49:19.167822 systemd[1]: Finished flatcar-openstack-hostname.service. Sep 6 01:49:19.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:19.170458 systemd[1]: Finished ignition-mount.service. Sep 6 01:49:19.190353 systemd[1]: Finished sysroot-boot.service. Sep 6 01:49:19.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:19.303429 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 6 01:49:19.314907 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (812) Sep 6 01:49:19.318639 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 6 01:49:19.318680 kernel: BTRFS info (device vda6): using free space tree Sep 6 01:49:19.318698 kernel: BTRFS info (device vda6): has skinny extents Sep 6 01:49:19.325798 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 6 01:49:19.328448 systemd[1]: Starting ignition-files.service... Sep 6 01:49:19.349887 ignition[832]: INFO : Ignition 2.14.0 Sep 6 01:49:19.349887 ignition[832]: INFO : Stage: files Sep 6 01:49:19.351693 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:19.351693 ignition[832]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:19.351693 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:19.354837 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Sep 6 01:49:19.354837 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 6 01:49:19.354837 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 6 01:49:19.357859 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 6 01:49:19.358900 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 6 01:49:19.360038 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 6 01:49:19.360038 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Sep 6 01:49:19.360038 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Sep 6 01:49:19.358953 unknown[832]: wrote ssh authorized keys file for user: core Sep 6 01:49:19.457126 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Sep 6 01:49:19.768377 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Sep 6 01:49:19.769730 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 6 01:49:19.770744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 6 01:49:19.777958 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:49:19.777958 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 6 01:49:19.777958 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 01:49:19.777958 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 01:49:19.777958 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 01:49:19.777958 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Sep 6 01:49:20.135744 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Sep 6 01:49:20.286203 systemd-networkd[709]: eth0: Gained IPv6LL Sep 6 01:49:21.353649 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 6 01:49:21.353649 ignition[832]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 6 01:49:21.353649 ignition[832]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 6 01:49:21.353649 ignition[832]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Sep 6 01:49:21.379490 ignition[832]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Sep 6 01:49:21.398219 kernel: kauditd_printk_skb: 27 callbacks suppressed Sep 6 01:49:21.398249 kernel: audit: type=1130 audit(1757123361.385:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.383404 systemd[1]: Finished ignition-files.service. Sep 6 01:49:21.399730 ignition[832]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:49:21.399730 ignition[832]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 6 01:49:21.399730 ignition[832]: INFO : files: files passed Sep 6 01:49:21.399730 ignition[832]: INFO : Ignition finished successfully Sep 6 01:49:21.420424 kernel: audit: type=1130 audit(1757123361.404:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.420460 kernel: audit: type=1130 audit(1757123361.410:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.420478 kernel: audit: type=1131 audit(1757123361.410:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.388442 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 6 01:49:21.395082 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 6 01:49:21.423984 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 6 01:49:21.398013 systemd[1]: Starting ignition-quench.service... Sep 6 01:49:21.403745 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 6 01:49:21.405266 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 6 01:49:21.405396 systemd[1]: Finished ignition-quench.service. Sep 6 01:49:21.411175 systemd[1]: Reached target ignition-complete.target. Sep 6 01:49:21.422191 systemd[1]: Starting initrd-parse-etc.service... Sep 6 01:49:21.442940 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 6 01:49:21.444023 systemd[1]: Finished initrd-parse-etc.service. Sep 6 01:49:21.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.447830 systemd[1]: Reached target initrd-fs.target. Sep 6 01:49:21.456661 kernel: audit: type=1130 audit(1757123361.444:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.456695 kernel: audit: type=1131 audit(1757123361.447:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.455381 systemd[1]: Reached target initrd.target. Sep 6 01:49:21.456103 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 6 01:49:21.457268 systemd[1]: Starting dracut-pre-pivot.service... Sep 6 01:49:21.474080 systemd[1]: Finished dracut-pre-pivot.service. Sep 6 01:49:21.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.480393 systemd[1]: Starting initrd-cleanup.service... Sep 6 01:49:21.481104 kernel: audit: type=1130 audit(1757123361.474:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.493645 systemd[1]: Stopped target nss-lookup.target. Sep 6 01:49:21.495130 systemd[1]: Stopped target remote-cryptsetup.target. Sep 6 01:49:21.496694 systemd[1]: Stopped target timers.target. Sep 6 01:49:21.498037 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 6 01:49:21.499836 systemd[1]: Stopped dracut-pre-pivot.service. Sep 6 01:49:21.518623 kernel: audit: type=1131 audit(1757123361.513:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.513853 systemd[1]: Stopped target initrd.target. Sep 6 01:49:21.519269 systemd[1]: Stopped target basic.target. Sep 6 01:49:21.520458 systemd[1]: Stopped target ignition-complete.target. Sep 6 01:49:21.521641 systemd[1]: Stopped target ignition-diskful.target. Sep 6 01:49:21.522859 systemd[1]: Stopped target initrd-root-device.target. Sep 6 01:49:21.524058 systemd[1]: Stopped target remote-fs.target. Sep 6 01:49:21.525218 systemd[1]: Stopped target remote-fs-pre.target. Sep 6 01:49:21.526399 systemd[1]: Stopped target sysinit.target. Sep 6 01:49:21.527640 systemd[1]: Stopped target local-fs.target. Sep 6 01:49:21.528981 systemd[1]: Stopped target local-fs-pre.target. Sep 6 01:49:21.530141 systemd[1]: Stopped target swap.target. Sep 6 01:49:21.531185 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 6 01:49:21.537389 kernel: audit: type=1131 audit(1757123361.531:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.531445 systemd[1]: Stopped dracut-pre-mount.service. Sep 6 01:49:21.532522 systemd[1]: Stopped target cryptsetup.target. Sep 6 01:49:21.544177 kernel: audit: type=1131 audit(1757123361.538:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.538099 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 6 01:49:21.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.538361 systemd[1]: Stopped dracut-initqueue.service. Sep 6 01:49:21.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.539415 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 6 01:49:21.539706 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 6 01:49:21.545084 systemd[1]: ignition-files.service: Deactivated successfully. Sep 6 01:49:21.545313 systemd[1]: Stopped ignition-files.service. Sep 6 01:49:21.547763 systemd[1]: Stopping ignition-mount.service... Sep 6 01:49:21.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.554319 systemd[1]: Stopping sysroot-boot.service... Sep 6 01:49:21.554974 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 6 01:49:21.555159 systemd[1]: Stopped systemd-udev-trigger.service. Sep 6 01:49:21.556119 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 6 01:49:21.556259 systemd[1]: Stopped dracut-pre-trigger.service. Sep 6 01:49:21.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.562945 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 6 01:49:21.563070 systemd[1]: Finished initrd-cleanup.service. Sep 6 01:49:21.583452 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 6 01:49:21.589646 ignition[870]: INFO : Ignition 2.14.0 Sep 6 01:49:21.589646 ignition[870]: INFO : Stage: umount Sep 6 01:49:21.589646 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 6 01:49:21.589646 ignition[870]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Sep 6 01:49:21.593442 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Sep 6 01:49:21.593442 ignition[870]: INFO : umount: umount passed Sep 6 01:49:21.593442 ignition[870]: INFO : Ignition finished successfully Sep 6 01:49:21.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.592859 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 6 01:49:21.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.593002 systemd[1]: Stopped ignition-mount.service. Sep 6 01:49:21.594193 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 6 01:49:21.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.594270 systemd[1]: Stopped ignition-disks.service. Sep 6 01:49:21.595549 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 6 01:49:21.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.595657 systemd[1]: Stopped ignition-kargs.service. Sep 6 01:49:21.601142 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 6 01:49:21.601210 systemd[1]: Stopped ignition-fetch.service. Sep 6 01:49:21.602801 systemd[1]: Stopped target network.target. Sep 6 01:49:21.603950 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 6 01:49:21.604017 systemd[1]: Stopped ignition-fetch-offline.service. Sep 6 01:49:21.605234 systemd[1]: Stopped target paths.target. Sep 6 01:49:21.606401 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 6 01:49:21.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.609650 systemd[1]: Stopped systemd-ask-password-console.path. Sep 6 01:49:21.611329 systemd[1]: Stopped target slices.target. Sep 6 01:49:21.612352 systemd[1]: Stopped target sockets.target. Sep 6 01:49:21.613136 systemd[1]: iscsid.socket: Deactivated successfully. Sep 6 01:49:21.613180 systemd[1]: Closed iscsid.socket. Sep 6 01:49:21.613811 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 6 01:49:21.613859 systemd[1]: Closed iscsiuio.socket. Sep 6 01:49:21.614983 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 6 01:49:21.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.615099 systemd[1]: Stopped ignition-setup.service. Sep 6 01:49:21.616379 systemd[1]: Stopping systemd-networkd.service... Sep 6 01:49:21.618604 systemd[1]: Stopping systemd-resolved.service... Sep 6 01:49:21.621867 systemd-networkd[709]: eth0: DHCPv6 lease lost Sep 6 01:49:21.623513 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 6 01:49:21.624262 systemd[1]: Stopped systemd-networkd.service. Sep 6 01:49:21.629000 audit: BPF prog-id=9 op=UNLOAD Sep 6 01:49:21.626099 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 6 01:49:21.626152 systemd[1]: Closed systemd-networkd.socket. Sep 6 01:49:21.629295 systemd[1]: Stopping network-cleanup.service... Sep 6 01:49:21.634687 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 6 01:49:21.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.634760 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 6 01:49:21.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.635955 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 6 01:49:21.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.636018 systemd[1]: Stopped systemd-sysctl.service. Sep 6 01:49:21.637548 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 6 01:49:21.637641 systemd[1]: Stopped systemd-modules-load.service. Sep 6 01:49:21.638649 systemd[1]: Stopping systemd-udevd.service... Sep 6 01:49:21.649737 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 6 01:49:21.650492 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 6 01:49:21.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.650700 systemd[1]: Stopped systemd-resolved.service. Sep 6 01:49:21.653000 audit: BPF prog-id=6 op=UNLOAD Sep 6 01:49:21.655840 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 6 01:49:21.656054 systemd[1]: Stopped systemd-udevd.service. Sep 6 01:49:21.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.659319 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 6 01:49:21.659773 systemd[1]: Stopped network-cleanup.service. Sep 6 01:49:21.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.661731 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 6 01:49:21.661794 systemd[1]: Closed systemd-udevd-control.socket. Sep 6 01:49:21.662788 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 6 01:49:21.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.662838 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 6 01:49:21.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.664098 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 6 01:49:21.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.664162 systemd[1]: Stopped dracut-pre-udev.service. Sep 6 01:49:21.665294 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 6 01:49:21.665357 systemd[1]: Stopped dracut-cmdline.service. Sep 6 01:49:21.666681 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 6 01:49:21.666753 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 6 01:49:21.668764 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 6 01:49:21.676668 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 6 01:49:21.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.676755 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Sep 6 01:49:21.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.678307 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 6 01:49:21.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.678376 systemd[1]: Stopped kmod-static-nodes.service. Sep 6 01:49:21.679042 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 6 01:49:21.679103 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 6 01:49:21.682940 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 6 01:49:21.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.683617 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 6 01:49:21.683755 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 6 01:49:21.739225 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 6 01:49:21.739397 systemd[1]: Stopped sysroot-boot.service. Sep 6 01:49:21.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.740889 systemd[1]: Reached target initrd-switch-root.target. Sep 6 01:49:21.741876 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 6 01:49:21.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:21.741940 systemd[1]: Stopped initrd-setup-root.service. Sep 6 01:49:21.744256 systemd[1]: Starting initrd-switch-root.service... Sep 6 01:49:21.760369 systemd[1]: Switching root. Sep 6 01:49:21.786297 iscsid[720]: iscsid shutting down. Sep 6 01:49:21.787210 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). Sep 6 01:49:21.787282 systemd-journald[202]: Journal stopped Sep 6 01:49:26.592823 kernel: SELinux: Class mctp_socket not defined in policy. Sep 6 01:49:26.592913 kernel: SELinux: Class anon_inode not defined in policy. Sep 6 01:49:26.592937 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 6 01:49:26.592962 kernel: SELinux: policy capability network_peer_controls=1 Sep 6 01:49:26.593002 kernel: SELinux: policy capability open_perms=1 Sep 6 01:49:26.593023 kernel: SELinux: policy capability extended_socket_class=1 Sep 6 01:49:26.593042 kernel: SELinux: policy capability always_check_network=0 Sep 6 01:49:26.593060 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 6 01:49:26.593079 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 6 01:49:26.593097 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 6 01:49:26.593115 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 6 01:49:26.593143 systemd[1]: Successfully loaded SELinux policy in 63.658ms. Sep 6 01:49:26.593167 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.905ms. Sep 6 01:49:26.593200 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 6 01:49:26.593223 systemd[1]: Detected virtualization kvm. Sep 6 01:49:26.593254 systemd[1]: Detected architecture x86-64. Sep 6 01:49:26.593275 systemd[1]: Detected first boot. Sep 6 01:49:26.593296 systemd[1]: Hostname set to . Sep 6 01:49:26.593317 systemd[1]: Initializing machine ID from VM UUID. Sep 6 01:49:26.593347 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 6 01:49:26.593369 systemd[1]: Populated /etc with preset unit settings. Sep 6 01:49:26.593389 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:49:26.593416 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:49:26.593454 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:49:26.593477 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 6 01:49:26.593510 systemd[1]: Stopped iscsiuio.service. Sep 6 01:49:26.593531 systemd[1]: iscsid.service: Deactivated successfully. Sep 6 01:49:26.593552 systemd[1]: Stopped iscsid.service. Sep 6 01:49:26.593572 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 6 01:49:26.593605 systemd[1]: Stopped initrd-switch-root.service. Sep 6 01:49:26.593633 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 6 01:49:26.593654 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 6 01:49:26.593686 systemd[1]: Created slice system-addon\x2drun.slice. Sep 6 01:49:26.593709 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 6 01:49:26.593729 systemd[1]: Created slice system-getty.slice. Sep 6 01:49:26.593748 systemd[1]: Created slice system-modprobe.slice. Sep 6 01:49:26.593780 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 6 01:49:26.593801 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 6 01:49:26.593822 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 6 01:49:26.593842 systemd[1]: Created slice user.slice. Sep 6 01:49:26.593866 systemd[1]: Started systemd-ask-password-console.path. Sep 6 01:49:26.593887 systemd[1]: Started systemd-ask-password-wall.path. Sep 6 01:49:26.593907 systemd[1]: Set up automount boot.automount. Sep 6 01:49:26.593927 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 6 01:49:26.593947 systemd[1]: Stopped target initrd-switch-root.target. Sep 6 01:49:26.593984 systemd[1]: Stopped target initrd-fs.target. Sep 6 01:49:26.594015 systemd[1]: Stopped target initrd-root-fs.target. Sep 6 01:49:26.594053 systemd[1]: Reached target integritysetup.target. Sep 6 01:49:26.594075 systemd[1]: Reached target remote-cryptsetup.target. Sep 6 01:49:26.594095 systemd[1]: Reached target remote-fs.target. Sep 6 01:49:26.594116 systemd[1]: Reached target slices.target. Sep 6 01:49:26.594155 systemd[1]: Reached target swap.target. Sep 6 01:49:26.594178 systemd[1]: Reached target torcx.target. Sep 6 01:49:26.594199 systemd[1]: Reached target veritysetup.target. Sep 6 01:49:26.594218 systemd[1]: Listening on systemd-coredump.socket. Sep 6 01:49:26.594237 systemd[1]: Listening on systemd-initctl.socket. Sep 6 01:49:26.594257 systemd[1]: Listening on systemd-networkd.socket. Sep 6 01:49:26.594302 systemd[1]: Listening on systemd-udevd-control.socket. Sep 6 01:49:26.594325 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 6 01:49:26.594345 systemd[1]: Listening on systemd-userdbd.socket. Sep 6 01:49:26.594371 systemd[1]: Mounting dev-hugepages.mount... Sep 6 01:49:26.594392 systemd[1]: Mounting dev-mqueue.mount... Sep 6 01:49:26.594412 systemd[1]: Mounting media.mount... Sep 6 01:49:26.594442 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:49:26.594465 systemd[1]: Mounting sys-kernel-debug.mount... Sep 6 01:49:26.594492 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 6 01:49:26.594525 systemd[1]: Mounting tmp.mount... Sep 6 01:49:26.594547 systemd[1]: Starting flatcar-tmpfiles.service... Sep 6 01:49:26.594568 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:49:26.594599 systemd[1]: Starting kmod-static-nodes.service... Sep 6 01:49:26.594621 systemd[1]: Starting modprobe@configfs.service... Sep 6 01:49:26.594642 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:49:26.594662 systemd[1]: Starting modprobe@drm.service... Sep 6 01:49:26.594681 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:49:26.594701 systemd[1]: Starting modprobe@fuse.service... Sep 6 01:49:26.594725 systemd[1]: Starting modprobe@loop.service... Sep 6 01:49:26.594746 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 6 01:49:26.594766 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 6 01:49:26.594798 systemd[1]: Stopped systemd-fsck-root.service. Sep 6 01:49:26.594819 kernel: kauditd_printk_skb: 59 callbacks suppressed Sep 6 01:49:26.594838 kernel: audit: type=1131 audit(1757123366.449:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.594858 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 6 01:49:26.594877 systemd[1]: Stopped systemd-fsck-usr.service. Sep 6 01:49:26.594908 kernel: audit: type=1131 audit(1757123366.463:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.594931 systemd[1]: Stopped systemd-journald.service. Sep 6 01:49:26.594950 kernel: fuse: init (API version 7.34) Sep 6 01:49:26.594970 kernel: audit: type=1130 audit(1757123366.489:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.594989 kernel: audit: type=1131 audit(1757123366.489:103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.595007 kernel: audit: type=1334 audit(1757123366.494:104): prog-id=15 op=LOAD Sep 6 01:49:26.595032 systemd[1]: Starting systemd-journald.service... Sep 6 01:49:26.595053 kernel: audit: type=1334 audit(1757123366.503:105): prog-id=16 op=LOAD Sep 6 01:49:26.595082 kernel: audit: type=1334 audit(1757123366.503:106): prog-id=17 op=LOAD Sep 6 01:49:26.595103 kernel: audit: type=1334 audit(1757123366.503:107): prog-id=13 op=UNLOAD Sep 6 01:49:26.595121 kernel: audit: type=1334 audit(1757123366.503:108): prog-id=14 op=UNLOAD Sep 6 01:49:26.595140 systemd[1]: Starting systemd-modules-load.service... Sep 6 01:49:26.595160 systemd[1]: Starting systemd-network-generator.service... Sep 6 01:49:26.595179 kernel: loop: module loaded Sep 6 01:49:26.595198 systemd[1]: Starting systemd-remount-fs.service... Sep 6 01:49:26.595218 systemd[1]: Starting systemd-udev-trigger.service... Sep 6 01:49:26.595252 systemd[1]: verity-setup.service: Deactivated successfully. Sep 6 01:49:26.595274 systemd[1]: Stopped verity-setup.service. Sep 6 01:49:26.595306 kernel: audit: type=1131 audit(1757123366.545:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.595328 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:49:26.595348 systemd[1]: Mounted dev-hugepages.mount. Sep 6 01:49:26.595367 systemd[1]: Mounted dev-mqueue.mount. Sep 6 01:49:26.595387 systemd[1]: Mounted media.mount. Sep 6 01:49:26.595407 systemd[1]: Mounted sys-kernel-debug.mount. Sep 6 01:49:26.595426 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 6 01:49:26.595468 systemd[1]: Mounted tmp.mount. Sep 6 01:49:26.595502 systemd[1]: Finished kmod-static-nodes.service. Sep 6 01:49:26.595524 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 6 01:49:26.595544 systemd[1]: Finished modprobe@configfs.service. Sep 6 01:49:26.595563 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:49:26.595582 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:49:26.596545 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:49:26.596570 systemd[1]: Finished modprobe@drm.service. Sep 6 01:49:26.596646 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:49:26.596673 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:49:26.596705 systemd-journald[989]: Journal started Sep 6 01:49:26.596787 systemd-journald[989]: Runtime Journal (/run/log/journal/aada02349f9d49e2a4aa6729a995f03f) is 4.7M, max 38.1M, 33.3M free. Sep 6 01:49:21.956000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 6 01:49:22.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:49:22.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 6 01:49:22.026000 audit: BPF prog-id=10 op=LOAD Sep 6 01:49:22.026000 audit: BPF prog-id=10 op=UNLOAD Sep 6 01:49:22.026000 audit: BPF prog-id=11 op=LOAD Sep 6 01:49:22.026000 audit: BPF prog-id=11 op=UNLOAD Sep 6 01:49:22.141000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 6 01:49:22.141000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058bc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:22.141000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:49:22.144000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 6 01:49:22.144000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000105995 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:22.144000 audit: CWD cwd="/" Sep 6 01:49:22.144000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:22.144000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:22.144000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 6 01:49:26.271000 audit: BPF prog-id=12 op=LOAD Sep 6 01:49:26.271000 audit: BPF prog-id=3 op=UNLOAD Sep 6 01:49:26.271000 audit: BPF prog-id=13 op=LOAD Sep 6 01:49:26.272000 audit: BPF prog-id=14 op=LOAD Sep 6 01:49:26.272000 audit: BPF prog-id=4 op=UNLOAD Sep 6 01:49:26.272000 audit: BPF prog-id=5 op=UNLOAD Sep 6 01:49:26.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.283000 audit: BPF prog-id=12 op=UNLOAD Sep 6 01:49:26.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.494000 audit: BPF prog-id=15 op=LOAD Sep 6 01:49:26.503000 audit: BPF prog-id=16 op=LOAD Sep 6 01:49:26.503000 audit: BPF prog-id=17 op=LOAD Sep 6 01:49:26.601007 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 6 01:49:26.601042 systemd[1]: Finished modprobe@fuse.service. Sep 6 01:49:26.503000 audit: BPF prog-id=13 op=UNLOAD Sep 6 01:49:26.503000 audit: BPF prog-id=14 op=UNLOAD Sep 6 01:49:26.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.589000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 6 01:49:26.589000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc8666f7c0 a2=4000 a3=7ffc8666f85c items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:26.589000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 6 01:49:26.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:22.137733 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:49:26.267914 systemd[1]: Queued start job for default target multi-user.target. Sep 6 01:49:22.138383 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:49:26.267934 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 6 01:49:26.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:22.138423 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:49:26.275028 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 6 01:49:22.138477 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 6 01:49:26.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:22.138496 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 6 01:49:26.605681 systemd[1]: Started systemd-journald.service. Sep 6 01:49:22.138570 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 6 01:49:22.138611 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 6 01:49:26.605823 systemd[1]: Finished flatcar-tmpfiles.service. Sep 6 01:49:22.138921 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 6 01:49:22.139004 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 6 01:49:26.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:22.139030 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 6 01:49:22.140809 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 6 01:49:22.140885 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 6 01:49:26.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.606976 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:49:22.140919 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 6 01:49:26.607151 systemd[1]: Finished modprobe@loop.service. Sep 6 01:49:22.140947 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 6 01:49:22.140979 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 6 01:49:22.141005 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 6 01:49:25.659925 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:49:25.660395 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:49:26.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:25.660681 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:49:26.609745 systemd[1]: Finished systemd-modules-load.service. Sep 6 01:49:25.661126 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 6 01:49:25.661225 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 6 01:49:25.661397 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-09-06T01:49:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 6 01:49:26.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.611794 systemd[1]: Finished systemd-network-generator.service. Sep 6 01:49:26.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.612909 systemd[1]: Finished systemd-remount-fs.service. Sep 6 01:49:26.614320 systemd[1]: Reached target network-pre.target. Sep 6 01:49:26.617016 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 6 01:49:26.620108 systemd[1]: Mounting sys-kernel-config.mount... Sep 6 01:49:26.623810 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 6 01:49:26.626211 systemd[1]: Starting systemd-hwdb-update.service... Sep 6 01:49:26.632812 systemd[1]: Starting systemd-journal-flush.service... Sep 6 01:49:26.633552 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:49:26.635255 systemd[1]: Starting systemd-random-seed.service... Sep 6 01:49:26.636038 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:49:26.638026 systemd[1]: Starting systemd-sysctl.service... Sep 6 01:49:26.642168 systemd[1]: Starting systemd-sysusers.service... Sep 6 01:49:26.648639 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 6 01:49:26.649103 systemd-journald[989]: Time spent on flushing to /var/log/journal/aada02349f9d49e2a4aa6729a995f03f is 67.165ms for 1296 entries. Sep 6 01:49:26.649103 systemd-journald[989]: System Journal (/var/log/journal/aada02349f9d49e2a4aa6729a995f03f) is 8.0M, max 584.8M, 576.8M free. Sep 6 01:49:26.728051 systemd-journald[989]: Received client request to flush runtime journal. Sep 6 01:49:26.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.660549 systemd[1]: Mounted sys-kernel-config.mount. Sep 6 01:49:26.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.677076 systemd[1]: Finished systemd-random-seed.service. Sep 6 01:49:26.678025 systemd[1]: Reached target first-boot-complete.target. Sep 6 01:49:26.694802 systemd[1]: Finished systemd-sysctl.service. Sep 6 01:49:26.718698 systemd[1]: Finished systemd-sysusers.service. Sep 6 01:49:26.721863 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 6 01:49:26.729210 systemd[1]: Finished systemd-journal-flush.service. Sep 6 01:49:26.768480 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 6 01:49:26.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.786547 systemd[1]: Finished systemd-udev-trigger.service. Sep 6 01:49:26.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:26.789564 systemd[1]: Starting systemd-udev-settle.service... Sep 6 01:49:26.802826 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 6 01:49:27.476033 systemd[1]: Finished systemd-hwdb-update.service. Sep 6 01:49:27.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:27.478000 audit: BPF prog-id=18 op=LOAD Sep 6 01:49:27.478000 audit: BPF prog-id=19 op=LOAD Sep 6 01:49:27.478000 audit: BPF prog-id=7 op=UNLOAD Sep 6 01:49:27.478000 audit: BPF prog-id=8 op=UNLOAD Sep 6 01:49:27.480677 systemd[1]: Starting systemd-udevd.service... Sep 6 01:49:27.507012 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Sep 6 01:49:27.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:27.544000 audit: BPF prog-id=20 op=LOAD Sep 6 01:49:27.540489 systemd[1]: Started systemd-udevd.service. Sep 6 01:49:27.546334 systemd[1]: Starting systemd-networkd.service... Sep 6 01:49:27.556000 audit: BPF prog-id=21 op=LOAD Sep 6 01:49:27.557000 audit: BPF prog-id=22 op=LOAD Sep 6 01:49:27.557000 audit: BPF prog-id=23 op=LOAD Sep 6 01:49:27.558857 systemd[1]: Starting systemd-userdbd.service... Sep 6 01:49:27.611254 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 6 01:49:27.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:27.619232 systemd[1]: Started systemd-userdbd.service. Sep 6 01:49:27.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:27.744047 systemd-networkd[1027]: lo: Link UP Sep 6 01:49:27.744060 systemd-networkd[1027]: lo: Gained carrier Sep 6 01:49:27.744898 systemd-networkd[1027]: Enumeration completed Sep 6 01:49:27.745025 systemd[1]: Started systemd-networkd.service. Sep 6 01:49:27.746745 systemd-networkd[1027]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 6 01:49:27.749050 systemd-networkd[1027]: eth0: Link UP Sep 6 01:49:27.749173 systemd-networkd[1027]: eth0: Gained carrier Sep 6 01:49:27.758635 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Sep 6 01:49:27.764824 systemd-networkd[1027]: eth0: DHCPv4 address 10.243.73.226/30, gateway 10.243.73.225 acquired from 10.243.73.225 Sep 6 01:49:27.786630 kernel: mousedev: PS/2 mouse device common for all mice Sep 6 01:49:27.792670 kernel: ACPI: button: Power Button [PWRF] Sep 6 01:49:27.822669 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 6 01:49:27.820000 audit[1024]: AVC avc: denied { confidentiality } for pid=1024 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 6 01:49:27.820000 audit[1024]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5578184c3190 a1=338ec a2=7f40112d2bc5 a3=5 items=110 ppid=1016 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:27.820000 audit: CWD cwd="/" Sep 6 01:49:27.820000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=1 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=2 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=3 name=(null) inode=15512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=4 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=5 name=(null) inode=15513 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=6 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=7 name=(null) inode=15514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=8 name=(null) inode=15514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=9 name=(null) inode=15515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=10 name=(null) inode=15514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=11 name=(null) inode=15516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=12 name=(null) inode=15514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=13 name=(null) inode=15517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=14 name=(null) inode=15514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=15 name=(null) inode=15518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=16 name=(null) inode=15514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=17 name=(null) inode=15519 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=18 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=19 name=(null) inode=15520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=20 name=(null) inode=15520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=21 name=(null) inode=15521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=22 name=(null) inode=15520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=23 name=(null) inode=15522 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=24 name=(null) inode=15520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=25 name=(null) inode=15523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=26 name=(null) inode=15520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=27 name=(null) inode=15524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=28 name=(null) inode=15520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=29 name=(null) inode=15525 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=30 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=31 name=(null) inode=15526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=32 name=(null) inode=15526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=33 name=(null) inode=15527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=34 name=(null) inode=15526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=35 name=(null) inode=15528 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=36 name=(null) inode=15526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=37 name=(null) inode=15529 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=38 name=(null) inode=15526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=39 name=(null) inode=15530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=40 name=(null) inode=15526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=41 name=(null) inode=15531 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=42 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=43 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=44 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=45 name=(null) inode=15533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=46 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=47 name=(null) inode=15534 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=48 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=49 name=(null) inode=15535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=50 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=51 name=(null) inode=15536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=52 name=(null) inode=15532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=53 name=(null) inode=15537 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=55 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=56 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=57 name=(null) inode=15539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=58 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=59 name=(null) inode=15540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=60 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=61 name=(null) inode=15541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=62 name=(null) inode=15541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=63 name=(null) inode=15542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=64 name=(null) inode=15541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=65 name=(null) inode=15543 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=66 name=(null) inode=15541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=67 name=(null) inode=15544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=68 name=(null) inode=15541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=69 name=(null) inode=15545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=70 name=(null) inode=15541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=71 name=(null) inode=15546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=72 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=73 name=(null) inode=15547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=74 name=(null) inode=15547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=75 name=(null) inode=15548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=76 name=(null) inode=15547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=77 name=(null) inode=15549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=78 name=(null) inode=15547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=79 name=(null) inode=15550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=80 name=(null) inode=15547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=81 name=(null) inode=15551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=82 name=(null) inode=15547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=83 name=(null) inode=15552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=84 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=85 name=(null) inode=15553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=86 name=(null) inode=15553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=87 name=(null) inode=15554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=88 name=(null) inode=15553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=89 name=(null) inode=15555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=90 name=(null) inode=15553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=91 name=(null) inode=15556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=92 name=(null) inode=15553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=93 name=(null) inode=15557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=94 name=(null) inode=15553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=95 name=(null) inode=15558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=96 name=(null) inode=15538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=97 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=98 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=99 name=(null) inode=15560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=100 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=101 name=(null) inode=15561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=102 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=103 name=(null) inode=15562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=104 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=105 name=(null) inode=15563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=106 name=(null) inode=15559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=107 name=(null) inode=15564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PATH item=109 name=(null) inode=15565 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:49:27.820000 audit: PROCTITLE proctitle="(udev-worker)" Sep 6 01:49:27.841658 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Sep 6 01:49:27.887010 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Sep 6 01:49:27.887049 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 6 01:49:27.887312 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 6 01:49:28.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.057613 systemd[1]: Finished systemd-udev-settle.service. Sep 6 01:49:28.060461 systemd[1]: Starting lvm2-activation-early.service... Sep 6 01:49:28.083923 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:49:28.113295 systemd[1]: Finished lvm2-activation-early.service. Sep 6 01:49:28.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.114185 systemd[1]: Reached target cryptsetup.target. Sep 6 01:49:28.116501 systemd[1]: Starting lvm2-activation.service... Sep 6 01:49:28.122297 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 6 01:49:28.152211 systemd[1]: Finished lvm2-activation.service. Sep 6 01:49:28.153080 systemd[1]: Reached target local-fs-pre.target. Sep 6 01:49:28.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.153760 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 6 01:49:28.153805 systemd[1]: Reached target local-fs.target. Sep 6 01:49:28.154377 systemd[1]: Reached target machines.target. Sep 6 01:49:28.156888 systemd[1]: Starting ldconfig.service... Sep 6 01:49:28.158117 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:49:28.158190 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:28.160532 systemd[1]: Starting systemd-boot-update.service... Sep 6 01:49:28.162648 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 6 01:49:28.165910 systemd[1]: Starting systemd-machine-id-commit.service... Sep 6 01:49:28.169526 systemd[1]: Starting systemd-sysext.service... Sep 6 01:49:28.180175 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Sep 6 01:49:28.182003 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 6 01:49:28.211240 systemd[1]: Unmounting usr-share-oem.mount... Sep 6 01:49:28.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.313766 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 6 01:49:28.334814 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 6 01:49:28.335120 systemd[1]: Unmounted usr-share-oem.mount. Sep 6 01:49:28.363692 kernel: loop0: detected capacity change from 0 to 224512 Sep 6 01:49:28.365708 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 6 01:49:28.366875 systemd[1]: Finished systemd-machine-id-commit.service. Sep 6 01:49:28.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.412634 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 6 01:49:28.439681 kernel: loop1: detected capacity change from 0 to 224512 Sep 6 01:49:28.453769 (sd-sysext)[1060]: Using extensions 'kubernetes'. Sep 6 01:49:28.454479 (sd-sysext)[1060]: Merged extensions into '/usr'. Sep 6 01:49:28.469636 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Sep 6 01:49:28.469636 systemd-fsck[1057]: /dev/vda1: 790 files, 120761/258078 clusters Sep 6 01:49:28.489109 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 6 01:49:28.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.499000 systemd[1]: Mounting boot.mount... Sep 6 01:49:28.499651 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:49:28.501824 systemd[1]: Mounting usr-share-oem.mount... Sep 6 01:49:28.502858 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:49:28.507801 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:49:28.510855 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:49:28.514110 systemd[1]: Starting modprobe@loop.service... Sep 6 01:49:28.516539 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:49:28.516761 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:28.516917 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:49:28.521340 systemd[1]: Mounted usr-share-oem.mount. Sep 6 01:49:28.522599 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:49:28.523103 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:49:28.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.524410 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:49:28.524607 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:49:28.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.525884 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:49:28.526052 systemd[1]: Finished modprobe@loop.service. Sep 6 01:49:28.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.528220 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:49:28.528380 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:49:28.536253 systemd[1]: Finished systemd-sysext.service. Sep 6 01:49:28.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.537355 systemd[1]: Mounted boot.mount. Sep 6 01:49:28.542325 systemd[1]: Starting ensure-sysext.service... Sep 6 01:49:28.544486 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 6 01:49:28.553801 systemd[1]: Reloading. Sep 6 01:49:28.603486 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 6 01:49:28.610281 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 6 01:49:28.613213 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 6 01:49:28.706698 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-09-06T01:49:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:49:28.706743 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-09-06T01:49:28Z" level=info msg="torcx already run" Sep 6 01:49:28.826587 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 6 01:49:28.858821 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:49:28.858856 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:49:28.887026 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:49:28.962000 audit: BPF prog-id=24 op=LOAD Sep 6 01:49:28.962000 audit: BPF prog-id=21 op=UNLOAD Sep 6 01:49:28.962000 audit: BPF prog-id=25 op=LOAD Sep 6 01:49:28.963000 audit: BPF prog-id=26 op=LOAD Sep 6 01:49:28.963000 audit: BPF prog-id=22 op=UNLOAD Sep 6 01:49:28.963000 audit: BPF prog-id=23 op=UNLOAD Sep 6 01:49:28.965000 audit: BPF prog-id=27 op=LOAD Sep 6 01:49:28.965000 audit: BPF prog-id=20 op=UNLOAD Sep 6 01:49:28.967000 audit: BPF prog-id=28 op=LOAD Sep 6 01:49:28.967000 audit: BPF prog-id=29 op=LOAD Sep 6 01:49:28.967000 audit: BPF prog-id=18 op=UNLOAD Sep 6 01:49:28.967000 audit: BPF prog-id=19 op=UNLOAD Sep 6 01:49:28.971000 audit: BPF prog-id=30 op=LOAD Sep 6 01:49:28.971000 audit: BPF prog-id=15 op=UNLOAD Sep 6 01:49:28.972000 audit: BPF prog-id=31 op=LOAD Sep 6 01:49:28.972000 audit: BPF prog-id=32 op=LOAD Sep 6 01:49:28.972000 audit: BPF prog-id=16 op=UNLOAD Sep 6 01:49:28.972000 audit: BPF prog-id=17 op=UNLOAD Sep 6 01:49:28.976726 systemd[1]: Finished ldconfig.service. Sep 6 01:49:28.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.981732 systemd[1]: Finished systemd-boot-update.service. Sep 6 01:49:28.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:28.984479 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 6 01:49:28.991821 systemd[1]: Starting audit-rules.service... Sep 6 01:49:28.994249 systemd[1]: Starting clean-ca-certificates.service... Sep 6 01:49:28.998276 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 6 01:49:29.002000 audit: BPF prog-id=33 op=LOAD Sep 6 01:49:29.004991 systemd[1]: Starting systemd-resolved.service... Sep 6 01:49:29.006000 audit: BPF prog-id=34 op=LOAD Sep 6 01:49:29.011501 systemd[1]: Starting systemd-timesyncd.service... Sep 6 01:49:29.014430 systemd[1]: Starting systemd-update-utmp.service... Sep 6 01:49:29.017952 systemd[1]: Finished clean-ca-certificates.service. Sep 6 01:49:29.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.020000 audit[1144]: SYSTEM_BOOT pid=1144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.025484 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:49:29.032221 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.035394 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:49:29.039217 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:49:29.042854 systemd[1]: Starting modprobe@loop.service... Sep 6 01:49:29.043696 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.043989 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:29.044167 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:49:29.047730 systemd[1]: Finished systemd-update-utmp.service. Sep 6 01:49:29.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.048997 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:49:29.049191 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:49:29.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.050429 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:49:29.050640 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:49:29.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.052353 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:49:29.052548 systemd[1]: Finished modprobe@loop.service. Sep 6 01:49:29.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.058960 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.061898 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:49:29.065551 systemd[1]: Starting modprobe@efi_pstore.service... Sep 6 01:49:29.069391 systemd[1]: Starting modprobe@loop.service... Sep 6 01:49:29.071814 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.072126 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:29.072457 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:49:29.074868 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:49:29.075166 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:49:29.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.081795 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 6 01:49:29.081983 systemd[1]: Finished modprobe@efi_pstore.service. Sep 6 01:49:29.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.084450 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.087792 systemd[1]: Starting modprobe@dm_mod.service... Sep 6 01:49:29.091471 systemd[1]: Starting modprobe@drm.service... Sep 6 01:49:29.092734 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.093068 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:29.098782 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 6 01:49:29.099555 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 6 01:49:29.099870 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 6 01:49:29.101580 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 6 01:49:29.102887 systemd[1]: Finished modprobe@loop.service. Sep 6 01:49:29.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.104190 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 6 01:49:29.104388 systemd[1]: Finished modprobe@dm_mod.service. Sep 6 01:49:29.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.106709 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.108182 systemd[1]: Finished ensure-sysext.service. Sep 6 01:49:29.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.109668 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 6 01:49:29.109857 systemd[1]: Finished modprobe@drm.service. Sep 6 01:49:29.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:29.119000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 6 01:49:29.119000 audit[1163]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee1b77440 a2=420 a3=0 items=0 ppid=1135 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:29.119000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 6 01:49:29.120352 augenrules[1163]: No rules Sep 6 01:49:29.121577 systemd[1]: Finished audit-rules.service. Sep 6 01:49:29.139059 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 6 01:49:29.141647 systemd[1]: Starting systemd-update-done.service... Sep 6 01:49:29.151894 systemd[1]: Finished systemd-update-done.service. Sep 6 01:49:29.166721 systemd[1]: Started systemd-timesyncd.service. Sep 6 01:49:29.167542 systemd[1]: Reached target time-set.target. Sep 6 01:49:29.202249 systemd-resolved[1139]: Positive Trust Anchors: Sep 6 01:49:29.202279 systemd-resolved[1139]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 6 01:49:29.202318 systemd-resolved[1139]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 6 01:49:29.216820 systemd-resolved[1139]: Using system hostname 'srv-lvab0.gb1.brightbox.com'. Sep 6 01:49:29.219724 systemd[1]: Started systemd-resolved.service. Sep 6 01:49:29.220600 systemd[1]: Reached target network.target. Sep 6 01:49:29.221178 systemd[1]: Reached target nss-lookup.target. Sep 6 01:49:29.221799 systemd[1]: Reached target sysinit.target. Sep 6 01:49:29.222505 systemd[1]: Started motdgen.path. Sep 6 01:49:29.223111 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 6 01:49:29.224053 systemd[1]: Started logrotate.timer. Sep 6 01:49:29.224783 systemd[1]: Started mdadm.timer. Sep 6 01:49:29.225327 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 6 01:49:29.225946 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 6 01:49:29.225996 systemd[1]: Reached target paths.target. Sep 6 01:49:29.226559 systemd[1]: Reached target timers.target. Sep 6 01:49:29.227606 systemd[1]: Listening on dbus.socket. Sep 6 01:49:29.229869 systemd[1]: Starting docker.socket... Sep 6 01:49:29.234397 systemd[1]: Listening on sshd.socket. Sep 6 01:49:29.235155 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:29.235814 systemd[1]: Listening on docker.socket. Sep 6 01:49:29.236515 systemd[1]: Reached target sockets.target. Sep 6 01:49:29.237112 systemd[1]: Reached target basic.target. Sep 6 01:49:29.237837 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.237889 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 6 01:49:29.239774 systemd[1]: Starting containerd.service... Sep 6 01:49:29.242135 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 6 01:49:29.244639 systemd[1]: Starting dbus.service... Sep 6 01:49:29.248295 systemd[1]: Starting enable-oem-cloudinit.service... Sep 6 01:49:29.253142 systemd[1]: Starting extend-filesystems.service... Sep 6 01:49:29.254143 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 6 01:49:29.261885 systemd[1]: Starting motdgen.service... Sep 6 01:49:29.328625 systemd-networkd[1027]: eth0: Gained IPv6LL Sep 6 01:49:29.340283 jq[1178]: false Sep 6 01:49:29.354404 systemd[1]: Starting prepare-helm.service... Sep 6 01:49:29.359441 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 6 01:49:29.364411 systemd[1]: Starting sshd-keygen.service... Sep 6 01:49:29.372509 systemd[1]: Starting systemd-logind.service... Sep 6 01:49:29.373796 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 6 01:49:29.374020 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 6 01:49:29.374959 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 6 01:49:29.378836 systemd[1]: Starting update-engine.service... Sep 6 01:49:29.382194 extend-filesystems[1179]: Found loop1 Sep 6 01:49:29.382842 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 6 01:49:29.384032 dbus-daemon[1175]: [system] SELinux support is enabled Sep 6 01:49:29.386656 dbus-daemon[1175]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1027 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 6 01:49:29.388067 extend-filesystems[1179]: Found vda Sep 6 01:49:29.388818 extend-filesystems[1179]: Found vda1 Sep 6 01:49:29.389973 systemd[1]: Started dbus.service. Sep 6 01:49:29.390208 extend-filesystems[1179]: Found vda2 Sep 6 01:49:29.394559 extend-filesystems[1179]: Found vda3 Sep 6 01:49:29.394559 extend-filesystems[1179]: Found usr Sep 6 01:49:29.394559 extend-filesystems[1179]: Found vda4 Sep 6 01:49:29.394559 extend-filesystems[1179]: Found vda6 Sep 6 01:49:29.394559 extend-filesystems[1179]: Found vda7 Sep 6 01:49:29.394559 extend-filesystems[1179]: Found vda9 Sep 6 01:49:29.394559 extend-filesystems[1179]: Checking size of /dev/vda9 Sep 6 01:49:29.396694 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 6 01:49:29.404791 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 6 01:49:29.405082 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 6 01:49:29.406828 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 6 01:49:29.407198 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 6 01:49:29.411287 systemd[1]: Reached target network-online.target. Sep 6 01:49:29.411860 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 6 01:49:29.414738 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:49:29.416232 extend-filesystems[1179]: Resized partition /dev/vda9 Sep 6 01:49:29.419840 systemd[1]: Starting kubelet.service... Sep 6 01:49:29.420469 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 6 01:49:29.420526 systemd[1]: Reached target system-config.target. Sep 6 01:49:29.421259 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 6 01:49:29.421310 systemd[1]: Reached target user-config.target. Sep 6 01:49:29.421957 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 6 01:49:29.432754 extend-filesystems[1205]: resize2fs 1.46.5 (30-Dec-2021) Sep 6 01:49:29.435219 systemd[1]: Starting systemd-hostnamed.service... Sep 6 01:49:29.440611 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Sep 6 01:49:29.447534 jq[1196]: true Sep 6 01:49:29.463115 jq[1208]: true Sep 6 01:49:29.464334 systemd[1]: motdgen.service: Deactivated successfully. Sep 6 01:49:29.464604 systemd[1]: Finished motdgen.service. Sep 6 01:49:29.562292 tar[1200]: linux-amd64/LICENSE Sep 6 01:49:29.562786 tar[1200]: linux-amd64/helm Sep 6 01:49:30.177092 systemd-timesyncd[1142]: Contacted time server 194.146.161.122:123 (0.flatcar.pool.ntp.org). Sep 6 01:49:30.177185 systemd-timesyncd[1142]: Initial clock synchronization to Sat 2025-09-06 01:49:30.176855 UTC. Sep 6 01:49:30.180812 systemd-resolved[1139]: Clock change detected. Flushing caches. Sep 6 01:49:30.240553 update_engine[1195]: I0906 01:49:30.239698 1195 main.cc:92] Flatcar Update Engine starting Sep 6 01:49:30.241348 systemd-logind[1194]: Watching system buttons on /dev/input/event2 (Power Button) Sep 6 01:49:30.241398 systemd-logind[1194]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 6 01:49:30.244012 systemd-logind[1194]: New seat seat0. Sep 6 01:49:30.246613 systemd[1]: Started update-engine.service. Sep 6 01:49:30.259172 systemd[1]: Started locksmithd.service. Sep 6 01:49:30.262987 update_engine[1195]: I0906 01:49:30.253845 1195 update_check_scheduler.cc:74] Next update check in 7m19s Sep 6 01:49:30.264626 systemd[1]: Started systemd-logind.service. Sep 6 01:49:30.353998 env[1201]: time="2025-09-06T01:49:30.353897160Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 6 01:49:30.418405 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Sep 6 01:49:30.456716 extend-filesystems[1205]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 6 01:49:30.456716 extend-filesystems[1205]: old_desc_blocks = 1, new_desc_blocks = 8 Sep 6 01:49:30.456716 extend-filesystems[1205]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Sep 6 01:49:30.469065 extend-filesystems[1179]: Resized filesystem in /dev/vda9 Sep 6 01:49:30.469789 env[1201]: time="2025-09-06T01:49:30.468680142Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 6 01:49:30.469789 env[1201]: time="2025-09-06T01:49:30.469696322Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:49:30.456972 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 6 01:49:30.470235 bash[1233]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:49:30.457372 systemd[1]: Finished extend-filesystems.service. Sep 6 01:49:30.466363 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.475320560Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.190-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.475386044Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.475777996Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.475806834Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.475827219Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.475861147Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 6 01:49:30.476201 env[1201]: time="2025-09-06T01:49:30.476050547Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:49:30.477957 env[1201]: time="2025-09-06T01:49:30.476708933Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 6 01:49:30.477957 env[1201]: time="2025-09-06T01:49:30.476974090Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 6 01:49:30.477957 env[1201]: time="2025-09-06T01:49:30.477002233Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 6 01:49:30.477957 env[1201]: time="2025-09-06T01:49:30.477127971Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 6 01:49:30.477957 env[1201]: time="2025-09-06T01:49:30.477150891Z" level=info msg="metadata content store policy set" policy=shared Sep 6 01:49:30.485424 env[1201]: time="2025-09-06T01:49:30.485378167Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 6 01:49:30.485530 env[1201]: time="2025-09-06T01:49:30.485427236Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 6 01:49:30.485530 env[1201]: time="2025-09-06T01:49:30.485460653Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 6 01:49:30.485649 env[1201]: time="2025-09-06T01:49:30.485585200Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485716 env[1201]: time="2025-09-06T01:49:30.485614214Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485772 env[1201]: time="2025-09-06T01:49:30.485721732Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485772 env[1201]: time="2025-09-06T01:49:30.485745327Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485772 env[1201]: time="2025-09-06T01:49:30.485766249Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485893 env[1201]: time="2025-09-06T01:49:30.485785769Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485893 env[1201]: time="2025-09-06T01:49:30.485805554Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.485893 env[1201]: time="2025-09-06T01:49:30.485824518Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.486035 env[1201]: time="2025-09-06T01:49:30.485890278Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 6 01:49:30.486081 env[1201]: time="2025-09-06T01:49:30.486062294Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 6 01:49:30.486276 env[1201]: time="2025-09-06T01:49:30.486230554Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 6 01:49:30.486772 env[1201]: time="2025-09-06T01:49:30.486737590Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 6 01:49:30.486872 env[1201]: time="2025-09-06T01:49:30.486799848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.486872 env[1201]: time="2025-09-06T01:49:30.486826397Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 6 01:49:30.486968 env[1201]: time="2025-09-06T01:49:30.486942365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487014 env[1201]: time="2025-09-06T01:49:30.486968376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487145 env[1201]: time="2025-09-06T01:49:30.487113279Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487205 env[1201]: time="2025-09-06T01:49:30.487163836Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487301 env[1201]: time="2025-09-06T01:49:30.487191092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487301 env[1201]: time="2025-09-06T01:49:30.487231211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487301 env[1201]: time="2025-09-06T01:49:30.487265205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487301 env[1201]: time="2025-09-06T01:49:30.487283876Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487665 env[1201]: time="2025-09-06T01:49:30.487305074Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 6 01:49:30.487665 env[1201]: time="2025-09-06T01:49:30.487572554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487665 env[1201]: time="2025-09-06T01:49:30.487601937Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487665 env[1201]: time="2025-09-06T01:49:30.487622219Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.487665 env[1201]: time="2025-09-06T01:49:30.487639915Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 6 01:49:30.487906 env[1201]: time="2025-09-06T01:49:30.487662137Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 6 01:49:30.487906 env[1201]: time="2025-09-06T01:49:30.487681108Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 6 01:49:30.487906 env[1201]: time="2025-09-06T01:49:30.487732201Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 6 01:49:30.487906 env[1201]: time="2025-09-06T01:49:30.487791932Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 6 01:49:30.490217 systemd[1]: Started containerd.service. Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.488102646Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.488198028Z" level=info msg="Connect containerd service" Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.488279417Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.489259800Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.489930794Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.490003402Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 6 01:49:30.491933 env[1201]: time="2025-09-06T01:49:30.491232403Z" level=info msg="containerd successfully booted in 0.176863s" Sep 6 01:49:30.504183 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 6 01:49:30.504389 systemd[1]: Started systemd-hostnamed.service. Sep 6 01:49:30.511666 dbus-daemon[1175]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1207 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 6 01:49:30.511825 env[1201]: time="2025-09-06T01:49:30.511629326Z" level=info msg="Start subscribing containerd event" Sep 6 01:49:30.512496 env[1201]: time="2025-09-06T01:49:30.512078200Z" level=info msg="Start recovering state" Sep 6 01:49:30.512496 env[1201]: time="2025-09-06T01:49:30.512275497Z" level=info msg="Start event monitor" Sep 6 01:49:30.512496 env[1201]: time="2025-09-06T01:49:30.512334768Z" level=info msg="Start snapshots syncer" Sep 6 01:49:30.512496 env[1201]: time="2025-09-06T01:49:30.512434524Z" level=info msg="Start cni network conf syncer for default" Sep 6 01:49:30.512496 env[1201]: time="2025-09-06T01:49:30.512455681Z" level=info msg="Start streaming server" Sep 6 01:49:30.516768 systemd[1]: Starting polkit.service... Sep 6 01:49:30.633026 polkitd[1238]: Started polkitd version 121 Sep 6 01:49:30.672560 polkitd[1238]: Loading rules from directory /etc/polkit-1/rules.d Sep 6 01:49:30.672902 polkitd[1238]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 6 01:49:30.675806 polkitd[1238]: Finished loading, compiling and executing 2 rules Sep 6 01:49:30.676482 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 6 01:49:30.676731 systemd[1]: Started polkit.service. Sep 6 01:49:30.679554 polkitd[1238]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 6 01:49:30.710103 systemd-hostnamed[1207]: Hostname set to (static) Sep 6 01:49:30.724268 systemd-networkd[1027]: eth0: Ignoring DHCPv6 address 2a02:1348:17c:d278:24:19ff:fef3:49e2/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17c:d278:24:19ff:fef3:49e2/64 assigned by NDisc. Sep 6 01:49:30.724282 systemd-networkd[1027]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Sep 6 01:49:31.696145 tar[1200]: linux-amd64/README.md Sep 6 01:49:31.704023 systemd[1]: Finished prepare-helm.service. Sep 6 01:49:31.740575 locksmithd[1223]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 6 01:49:32.429881 systemd[1]: Created slice system-sshd.slice. Sep 6 01:49:32.670063 systemd[1]: Started kubelet.service. Sep 6 01:49:33.456993 kubelet[1256]: E0906 01:49:33.456925 1256 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:49:33.459095 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:49:33.459353 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:49:33.459790 systemd[1]: kubelet.service: Consumed 1.739s CPU time. Sep 6 01:49:34.343456 sshd_keygen[1212]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 6 01:49:34.370936 systemd[1]: Finished sshd-keygen.service. Sep 6 01:49:34.378610 systemd[1]: Starting issuegen.service... Sep 6 01:49:34.381164 systemd[1]: Started sshd@0-10.243.73.226:22-139.178.89.65:56608.service. Sep 6 01:49:34.390893 systemd[1]: issuegen.service: Deactivated successfully. Sep 6 01:49:34.391177 systemd[1]: Finished issuegen.service. Sep 6 01:49:34.394254 systemd[1]: Starting systemd-user-sessions.service... Sep 6 01:49:34.408704 systemd[1]: Finished systemd-user-sessions.service. Sep 6 01:49:34.411898 systemd[1]: Started getty@tty1.service. Sep 6 01:49:34.414757 systemd[1]: Started serial-getty@ttyS0.service. Sep 6 01:49:34.415920 systemd[1]: Reached target getty.target. Sep 6 01:49:35.358507 sshd[1271]: Accepted publickey for core from 139.178.89.65 port 56608 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:35.361884 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:35.379513 systemd[1]: Created slice user-500.slice. Sep 6 01:49:35.383017 systemd[1]: Starting user-runtime-dir@500.service... Sep 6 01:49:35.389646 systemd-logind[1194]: New session 1 of user core. Sep 6 01:49:35.401762 systemd[1]: Finished user-runtime-dir@500.service. Sep 6 01:49:35.406229 systemd[1]: Starting user@500.service... Sep 6 01:49:35.411898 (systemd)[1279]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:35.517369 systemd[1279]: Queued start job for default target default.target. Sep 6 01:49:35.519185 systemd[1279]: Reached target paths.target. Sep 6 01:49:35.519401 systemd[1279]: Reached target sockets.target. Sep 6 01:49:35.519614 systemd[1279]: Reached target timers.target. Sep 6 01:49:35.519870 systemd[1279]: Reached target basic.target. Sep 6 01:49:35.520143 systemd[1279]: Reached target default.target. Sep 6 01:49:35.520227 systemd[1]: Started user@500.service. Sep 6 01:49:35.520441 systemd[1279]: Startup finished in 98ms. Sep 6 01:49:35.524578 systemd[1]: Started session-1.scope. Sep 6 01:49:36.176059 systemd[1]: Started sshd@1-10.243.73.226:22-139.178.89.65:56624.service. Sep 6 01:49:37.071215 sshd[1288]: Accepted publickey for core from 139.178.89.65 port 56624 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:37.091625 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:37.100769 systemd[1]: Started session-2.scope. Sep 6 01:49:37.102957 systemd-logind[1194]: New session 2 of user core. Sep 6 01:49:37.113562 coreos-metadata[1174]: Sep 06 01:49:37.111 WARN failed to locate config-drive, using the metadata service API instead Sep 6 01:49:37.164526 coreos-metadata[1174]: Sep 06 01:49:37.164 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Sep 6 01:49:37.188112 coreos-metadata[1174]: Sep 06 01:49:37.188 INFO Fetch successful Sep 6 01:49:37.188613 coreos-metadata[1174]: Sep 06 01:49:37.188 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 6 01:49:37.219640 coreos-metadata[1174]: Sep 06 01:49:37.219 INFO Fetch successful Sep 6 01:49:37.221737 unknown[1174]: wrote ssh authorized keys file for user: core Sep 6 01:49:37.235134 update-ssh-keys[1293]: Updated "/home/core/.ssh/authorized_keys" Sep 6 01:49:37.235723 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 6 01:49:37.236895 systemd[1]: Reached target multi-user.target. Sep 6 01:49:37.239881 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 6 01:49:37.250244 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 6 01:49:37.250492 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 6 01:49:37.252619 systemd[1]: Startup finished in 1.308s (kernel) + 6.070s (initrd) + 14.764s (userspace) = 22.144s. Sep 6 01:49:37.695023 sshd[1288]: pam_unix(sshd:session): session closed for user core Sep 6 01:49:37.699270 systemd[1]: sshd@1-10.243.73.226:22-139.178.89.65:56624.service: Deactivated successfully. Sep 6 01:49:37.700472 systemd[1]: session-2.scope: Deactivated successfully. Sep 6 01:49:37.701293 systemd-logind[1194]: Session 2 logged out. Waiting for processes to exit. Sep 6 01:49:37.702420 systemd-logind[1194]: Removed session 2. Sep 6 01:49:37.843501 systemd[1]: Started sshd@2-10.243.73.226:22-139.178.89.65:56634.service. Sep 6 01:49:38.736441 sshd[1298]: Accepted publickey for core from 139.178.89.65 port 56634 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:38.738901 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:38.746627 systemd-logind[1194]: New session 3 of user core. Sep 6 01:49:38.747810 systemd[1]: Started session-3.scope. Sep 6 01:49:39.355104 sshd[1298]: pam_unix(sshd:session): session closed for user core Sep 6 01:49:39.359808 systemd[1]: sshd@2-10.243.73.226:22-139.178.89.65:56634.service: Deactivated successfully. Sep 6 01:49:39.361215 systemd[1]: session-3.scope: Deactivated successfully. Sep 6 01:49:39.362100 systemd-logind[1194]: Session 3 logged out. Waiting for processes to exit. Sep 6 01:49:39.363572 systemd-logind[1194]: Removed session 3. Sep 6 01:49:39.505096 systemd[1]: Started sshd@3-10.243.73.226:22-139.178.89.65:56648.service. Sep 6 01:49:40.404554 sshd[1304]: Accepted publickey for core from 139.178.89.65 port 56648 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:40.406989 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:40.412896 systemd-logind[1194]: New session 4 of user core. Sep 6 01:49:40.413848 systemd[1]: Started session-4.scope. Sep 6 01:49:41.030889 sshd[1304]: pam_unix(sshd:session): session closed for user core Sep 6 01:49:41.034699 systemd-logind[1194]: Session 4 logged out. Waiting for processes to exit. Sep 6 01:49:41.035027 systemd[1]: sshd@3-10.243.73.226:22-139.178.89.65:56648.service: Deactivated successfully. Sep 6 01:49:41.035909 systemd[1]: session-4.scope: Deactivated successfully. Sep 6 01:49:41.036942 systemd-logind[1194]: Removed session 4. Sep 6 01:49:41.188097 systemd[1]: Started sshd@4-10.243.73.226:22-139.178.89.65:56350.service. Sep 6 01:49:42.137311 sshd[1310]: Accepted publickey for core from 139.178.89.65 port 56350 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:42.139246 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:42.145526 systemd-logind[1194]: New session 5 of user core. Sep 6 01:49:42.146390 systemd[1]: Started session-5.scope. Sep 6 01:49:42.656726 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 6 01:49:42.657701 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:49:42.670092 dbus-daemon[1175]: \xd0\xfd\xb0\xe2YU: received setenforce notice (enforcing=-519005168) Sep 6 01:49:42.672465 sudo[1313]: pam_unix(sudo:session): session closed for user root Sep 6 01:49:42.827839 sshd[1310]: pam_unix(sshd:session): session closed for user core Sep 6 01:49:42.832191 systemd-logind[1194]: Session 5 logged out. Waiting for processes to exit. Sep 6 01:49:42.832697 systemd[1]: sshd@4-10.243.73.226:22-139.178.89.65:56350.service: Deactivated successfully. Sep 6 01:49:42.833568 systemd[1]: session-5.scope: Deactivated successfully. Sep 6 01:49:42.834918 systemd-logind[1194]: Removed session 5. Sep 6 01:49:42.975661 systemd[1]: Started sshd@5-10.243.73.226:22-139.178.89.65:56352.service. Sep 6 01:49:43.696232 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 6 01:49:43.696556 systemd[1]: Stopped kubelet.service. Sep 6 01:49:43.696628 systemd[1]: kubelet.service: Consumed 1.739s CPU time. Sep 6 01:49:43.699077 systemd[1]: Starting kubelet.service... Sep 6 01:49:43.867662 sshd[1317]: Accepted publickey for core from 139.178.89.65 port 56352 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:43.869850 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:43.876815 systemd[1]: Started session-6.scope. Sep 6 01:49:43.878840 systemd-logind[1194]: New session 6 of user core. Sep 6 01:49:44.004736 systemd[1]: Started kubelet.service. Sep 6 01:49:44.077060 kubelet[1324]: E0906 01:49:44.076992 1324 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:49:44.080906 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:49:44.081138 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:49:44.346290 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 6 01:49:44.347626 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:49:44.352272 sudo[1330]: pam_unix(sudo:session): session closed for user root Sep 6 01:49:44.359511 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 6 01:49:44.359874 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:49:44.373095 systemd[1]: Stopping audit-rules.service... Sep 6 01:49:44.373000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:49:44.376494 auditctl[1333]: No rules Sep 6 01:49:44.377668 kernel: kauditd_printk_skb: 212 callbacks suppressed Sep 6 01:49:44.377804 kernel: audit: type=1305 audit(1757123384.373:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 6 01:49:44.378311 systemd[1]: audit-rules.service: Deactivated successfully. Sep 6 01:49:44.378601 systemd[1]: Stopped audit-rules.service. Sep 6 01:49:44.373000 audit[1333]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe773fdeb0 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:44.385617 systemd[1]: Starting audit-rules.service... Sep 6 01:49:44.387832 kernel: audit: type=1300 audit(1757123384.373:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe773fdeb0 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:44.373000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:49:44.390435 kernel: audit: type=1327 audit(1757123384.373:205): proctitle=2F7362696E2F617564697463746C002D44 Sep 6 01:49:44.390526 kernel: audit: type=1131 audit(1757123384.377:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.411992 augenrules[1350]: No rules Sep 6 01:49:44.413357 systemd[1]: Finished audit-rules.service. Sep 6 01:49:44.420466 kernel: audit: type=1130 audit(1757123384.412:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.420581 kernel: audit: type=1106 audit(1757123384.417:208): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.417000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.419285 sudo[1329]: pam_unix(sudo:session): session closed for user root Sep 6 01:49:44.418000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.431597 kernel: audit: type=1104 audit(1757123384.418:209): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.611823 sshd[1317]: pam_unix(sshd:session): session closed for user core Sep 6 01:49:44.612000 audit[1317]: USER_END pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:44.616336 systemd-logind[1194]: Session 6 logged out. Waiting for processes to exit. Sep 6 01:49:44.618588 systemd[1]: sshd@5-10.243.73.226:22-139.178.89.65:56352.service: Deactivated successfully. Sep 6 01:49:44.619510 systemd[1]: session-6.scope: Deactivated successfully. Sep 6 01:49:44.612000 audit[1317]: CRED_DISP pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:44.621378 systemd-logind[1194]: Removed session 6. Sep 6 01:49:44.627399 kernel: audit: type=1106 audit(1757123384.612:210): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:44.627527 kernel: audit: type=1104 audit(1757123384.612:211): pid=1317 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:44.627584 kernel: audit: type=1131 audit(1757123384.613:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.243.73.226:22-139.178.89.65:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.243.73.226:22-139.178.89.65:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:44.759296 systemd[1]: Started sshd@6-10.243.73.226:22-139.178.89.65:56360.service. Sep 6 01:49:44.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.243.73.226:22-139.178.89.65:56360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:45.645000 audit[1356]: USER_ACCT pid=1356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:45.646961 sshd[1356]: Accepted publickey for core from 139.178.89.65 port 56360 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:49:45.646000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:45.646000 audit[1356]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb37aa7d0 a2=3 a3=0 items=0 ppid=1 pid=1356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:45.646000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:49:45.649111 sshd[1356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:49:45.656217 systemd[1]: Started session-7.scope. Sep 6 01:49:45.656658 systemd-logind[1194]: New session 7 of user core. Sep 6 01:49:45.663000 audit[1356]: USER_START pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:45.665000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:49:46.124000 audit[1359]: USER_ACCT pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:46.124000 audit[1359]: CRED_REFR pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:46.125951 sudo[1359]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 6 01:49:46.126398 sudo[1359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 6 01:49:46.129000 audit[1359]: USER_START pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:49:46.179818 systemd[1]: Starting docker.service... Sep 6 01:49:46.288197 env[1369]: time="2025-09-06T01:49:46.287970058Z" level=info msg="Starting up" Sep 6 01:49:46.291180 env[1369]: time="2025-09-06T01:49:46.291135205Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 6 01:49:46.291364 env[1369]: time="2025-09-06T01:49:46.291333652Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 6 01:49:46.291549 env[1369]: time="2025-09-06T01:49:46.291515732Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 6 01:49:46.291706 env[1369]: time="2025-09-06T01:49:46.291675650Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 6 01:49:46.299688 env[1369]: time="2025-09-06T01:49:46.299655052Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 6 01:49:46.299878 env[1369]: time="2025-09-06T01:49:46.299838573Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 6 01:49:46.300041 env[1369]: time="2025-09-06T01:49:46.300008966Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 6 01:49:46.300184 env[1369]: time="2025-09-06T01:49:46.300156966Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 6 01:49:46.334304 env[1369]: time="2025-09-06T01:49:46.334257375Z" level=info msg="Loading containers: start." Sep 6 01:49:46.440000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.440000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcd88dc7c0 a2=0 a3=7ffcd88dc7ac items=0 ppid=1369 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 6 01:49:46.444000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.444000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd7eab03b0 a2=0 a3=7ffd7eab039c items=0 ppid=1369 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 6 01:49:46.448000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.448000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe05113880 a2=0 a3=7ffe0511386c items=0 ppid=1369 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 6 01:49:46.451000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.451000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff00a9e320 a2=0 a3=7fff00a9e30c items=0 ppid=1369 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.451000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 6 01:49:46.455000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.455000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5cb138f0 a2=0 a3=7ffe5cb138dc items=0 ppid=1369 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 6 01:49:46.476000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.476000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd1b71240 a2=0 a3=7ffcd1b7122c items=0 ppid=1369 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 6 01:49:46.486000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.486000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc94979b30 a2=0 a3=7ffc94979b1c items=0 ppid=1369 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 6 01:49:46.489000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.489000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff9a959740 a2=0 a3=7fff9a95972c items=0 ppid=1369 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 6 01:49:46.492000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.492000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffbd119e30 a2=0 a3=7fffbd119e1c items=0 ppid=1369 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.492000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:49:46.503000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.503000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdad9acfb0 a2=0 a3=7ffdad9acf9c items=0 ppid=1369 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.503000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:49:46.509000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.509000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeccc20b40 a2=0 a3=7ffeccc20b2c items=0 ppid=1369 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:49:46.535500 kernel: Initializing XFRM netlink socket Sep 6 01:49:46.580346 env[1369]: time="2025-09-06T01:49:46.580188784Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 6 01:49:46.634000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.634000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe19ae7960 a2=0 a3=7ffe19ae794c items=0 ppid=1369 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 6 01:49:46.647000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.647000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc40cee4f0 a2=0 a3=7ffc40cee4dc items=0 ppid=1369 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.647000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 6 01:49:46.653000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.653000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc4b969410 a2=0 a3=7ffc4b9693fc items=0 ppid=1369 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 6 01:49:46.656000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.656000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff487cdda0 a2=0 a3=7fff487cdd8c items=0 ppid=1369 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 6 01:49:46.659000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.659000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffef886e370 a2=0 a3=7ffef886e35c items=0 ppid=1369 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 6 01:49:46.662000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.662000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffb7162fd0 a2=0 a3=7fffb7162fbc items=0 ppid=1369 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 6 01:49:46.665000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.665000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffee6512380 a2=0 a3=7ffee651236c items=0 ppid=1369 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 6 01:49:46.677000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.677000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc89ddf8c0 a2=0 a3=7ffc89ddf8ac items=0 ppid=1369 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 6 01:49:46.681000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.681000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc44e4e7b0 a2=0 a3=7ffc44e4e79c items=0 ppid=1369 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 6 01:49:46.684000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.684000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe02f8d530 a2=0 a3=7ffe02f8d51c items=0 ppid=1369 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.684000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 6 01:49:46.687000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.687000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd903f11b0 a2=0 a3=7ffd903f119c items=0 ppid=1369 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 6 01:49:46.689250 systemd-networkd[1027]: docker0: Link UP Sep 6 01:49:46.702000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.702000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe55f9dea0 a2=0 a3=7ffe55f9de8c items=0 ppid=1369 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:49:46.707000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:49:46.707000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd9887bb10 a2=0 a3=7ffd9887bafc items=0 ppid=1369 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:49:46.707000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 6 01:49:46.709318 env[1369]: time="2025-09-06T01:49:46.709272399Z" level=info msg="Loading containers: done." Sep 6 01:49:46.734526 env[1369]: time="2025-09-06T01:49:46.734447044Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 6 01:49:46.735144 env[1369]: time="2025-09-06T01:49:46.735112487Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 6 01:49:46.735459 env[1369]: time="2025-09-06T01:49:46.735430668Z" level=info msg="Daemon has completed initialization" Sep 6 01:49:46.764071 systemd[1]: Started docker.service. Sep 6 01:49:46.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:46.776402 env[1369]: time="2025-09-06T01:49:46.776296227Z" level=info msg="API listen on /run/docker.sock" Sep 6 01:49:48.109361 env[1201]: time="2025-09-06T01:49:48.109163918Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.8\"" Sep 6 01:49:49.148528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2887755753.mount: Deactivated successfully. Sep 6 01:49:51.920095 env[1201]: time="2025-09-06T01:49:51.919869390Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:51.924181 env[1201]: time="2025-09-06T01:49:51.924146200Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d4edaa48e2f940c934e0f7cfd5209fc85e65ab5e842b980f41263d1764661f1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:51.926645 env[1201]: time="2025-09-06T01:49:51.926586135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:51.928004 env[1201]: time="2025-09-06T01:49:51.927964395Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.8\" returns image reference \"sha256:0d4edaa48e2f940c934e0f7cfd5209fc85e65ab5e842b980f41263d1764661f1\"" Sep 6 01:49:51.929654 env[1201]: time="2025-09-06T01:49:51.929618450Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.8\"" Sep 6 01:49:51.929968 env[1201]: time="2025-09-06T01:49:51.929901391Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6e1a2f9b24f69ee77d0c0edaf32b31fdbb5e1a613f4476272197e6e1e239050b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:54.196524 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 6 01:49:54.197036 systemd[1]: Stopped kubelet.service. Sep 6 01:49:54.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:54.201535 kernel: kauditd_printk_skb: 84 callbacks suppressed Sep 6 01:49:54.201863 kernel: audit: type=1130 audit(1757123394.195:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:54.212074 systemd[1]: Starting kubelet.service... Sep 6 01:49:54.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:54.220602 kernel: audit: type=1131 audit(1757123394.195:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:54.560958 kernel: audit: type=1130 audit(1757123394.550:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:54.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:49:54.551685 systemd[1]: Started kubelet.service. Sep 6 01:49:54.705760 kubelet[1500]: E0906 01:49:54.705677 1500 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:49:54.714972 kernel: audit: type=1131 audit(1757123394.707:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:49:54.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:49:54.708363 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:49:54.708674 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:49:55.320634 env[1201]: time="2025-09-06T01:49:55.320551831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:55.322921 env[1201]: time="2025-09-06T01:49:55.322885589Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b248d0b0c74ad8230e0bae0cbed477560e8a1e8c7ef5f29b7e75c1f273c8a091,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:55.326398 env[1201]: time="2025-09-06T01:49:55.326309552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:55.328214 env[1201]: time="2025-09-06T01:49:55.328174106Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:8788ccd28ceed9e2e5f8fc31375ef5771df8ea6e518b362c9a06f3cc709cd6c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:55.329533 env[1201]: time="2025-09-06T01:49:55.329467943Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.8\" returns image reference \"sha256:b248d0b0c74ad8230e0bae0cbed477560e8a1e8c7ef5f29b7e75c1f273c8a091\"" Sep 6 01:49:55.330373 env[1201]: time="2025-09-06T01:49:55.330339077Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.8\"" Sep 6 01:49:58.025188 env[1201]: time="2025-09-06T01:49:58.025069998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:58.027690 env[1201]: time="2025-09-06T01:49:58.027657289Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2ac266f06c9a5a3d0d20ae482dbccb54d3be454d5ca49f48b528bdf5bae3e908,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:58.030010 env[1201]: time="2025-09-06T01:49:58.029971574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:58.032379 env[1201]: time="2025-09-06T01:49:58.032345835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:43c58bcbd1c7812dd19f8bfa5ae11093ebefd28699453ce86fc710869e155cd4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:49:58.033495 env[1201]: time="2025-09-06T01:49:58.033428079Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.8\" returns image reference \"sha256:2ac266f06c9a5a3d0d20ae482dbccb54d3be454d5ca49f48b528bdf5bae3e908\"" Sep 6 01:49:58.034480 env[1201]: time="2025-09-06T01:49:58.034434889Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\"" Sep 6 01:50:00.009765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount296381417.mount: Deactivated successfully. Sep 6 01:50:00.784116 kernel: audit: type=1131 audit(1757123400.769:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:00.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:00.770138 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 6 01:50:00.800688 kernel: audit: type=1334 audit(1757123400.794:252): prog-id=40 op=UNLOAD Sep 6 01:50:00.800857 kernel: audit: type=1334 audit(1757123400.794:253): prog-id=39 op=UNLOAD Sep 6 01:50:00.800932 kernel: audit: type=1334 audit(1757123400.794:254): prog-id=38 op=UNLOAD Sep 6 01:50:00.794000 audit: BPF prog-id=40 op=UNLOAD Sep 6 01:50:00.794000 audit: BPF prog-id=39 op=UNLOAD Sep 6 01:50:00.794000 audit: BPF prog-id=38 op=UNLOAD Sep 6 01:50:01.236121 env[1201]: time="2025-09-06T01:50:01.235990451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:01.242772 env[1201]: time="2025-09-06T01:50:01.242711561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d7b94972d43c5d6ce8088a8bcd08614a5ecf2bf04166232c688adcd0b8ed4b12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:01.245681 env[1201]: time="2025-09-06T01:50:01.245644400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:01.248316 env[1201]: time="2025-09-06T01:50:01.248279893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:adc1335b480ddd833aac3b0bd20f68ff0f3c3cf7a0bd337933b006d9f5cec40a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:01.249034 env[1201]: time="2025-09-06T01:50:01.248948627Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.8\" returns image reference \"sha256:d7b94972d43c5d6ce8088a8bcd08614a5ecf2bf04166232c688adcd0b8ed4b12\"" Sep 6 01:50:01.250796 env[1201]: time="2025-09-06T01:50:01.250762748Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Sep 6 01:50:02.011640 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1288580757.mount: Deactivated successfully. Sep 6 01:50:03.687116 env[1201]: time="2025-09-06T01:50:03.686933606Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:03.690082 env[1201]: time="2025-09-06T01:50:03.690036917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:03.692995 env[1201]: time="2025-09-06T01:50:03.692958260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:03.695822 env[1201]: time="2025-09-06T01:50:03.695782805Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:03.697259 env[1201]: time="2025-09-06T01:50:03.697195006Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Sep 6 01:50:03.698903 env[1201]: time="2025-09-06T01:50:03.698859467Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 6 01:50:04.369492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1611967860.mount: Deactivated successfully. Sep 6 01:50:04.376623 env[1201]: time="2025-09-06T01:50:04.376527486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:04.379786 env[1201]: time="2025-09-06T01:50:04.379714335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:04.381563 env[1201]: time="2025-09-06T01:50:04.381527739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:04.383560 env[1201]: time="2025-09-06T01:50:04.383519293Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:04.385421 env[1201]: time="2025-09-06T01:50:04.385372209Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 6 01:50:04.386169 env[1201]: time="2025-09-06T01:50:04.386099593Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Sep 6 01:50:04.946160 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 6 01:50:04.946509 systemd[1]: Stopped kubelet.service. Sep 6 01:50:04.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:04.976598 kernel: audit: type=1130 audit(1757123404.946:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:04.976727 kernel: audit: type=1131 audit(1757123404.946:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:04.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:04.978074 systemd[1]: Starting kubelet.service... Sep 6 01:50:05.216238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1579964037.mount: Deactivated successfully. Sep 6 01:50:05.404134 systemd[1]: Started kubelet.service. Sep 6 01:50:05.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:05.410515 kernel: audit: type=1130 audit(1757123405.404:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:05.608398 kubelet[1512]: E0906 01:50:05.608238 1512 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 6 01:50:05.610249 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 6 01:50:05.610503 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 6 01:50:05.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:50:05.616496 kernel: audit: type=1131 audit(1757123405.610:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:50:08.878436 env[1201]: time="2025-09-06T01:50:08.878360699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:08.880763 env[1201]: time="2025-09-06T01:50:08.880722750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:08.884544 env[1201]: time="2025-09-06T01:50:08.883396509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:08.886144 env[1201]: time="2025-09-06T01:50:08.886107802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:08.887616 env[1201]: time="2025-09-06T01:50:08.887569280Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Sep 6 01:50:13.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:13.466759 systemd[1]: Stopped kubelet.service. Sep 6 01:50:13.492511 kernel: audit: type=1130 audit(1757123413.465:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:13.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:13.498625 kernel: audit: type=1131 audit(1757123413.490:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:13.499004 systemd[1]: Starting kubelet.service... Sep 6 01:50:13.542110 systemd[1]: Reloading. Sep 6 01:50:13.711595 /usr/lib/systemd/system-generators/torcx-generator[1576]: time="2025-09-06T01:50:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:50:13.713629 /usr/lib/systemd/system-generators/torcx-generator[1576]: time="2025-09-06T01:50:13Z" level=info msg="torcx already run" Sep 6 01:50:13.799677 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:50:13.799717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:50:13.828578 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:50:13.932510 kernel: audit: type=1400 audit(1757123413.920:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941286 kernel: audit: type=1400 audit(1757123413.920:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.947057 kernel: audit: type=1400 audit(1757123413.926:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.947152 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 01:50:13.952463 kernel: audit: type=1400 audit(1757123413.926:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.952557 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.959867 kernel: audit: type=1400 audit(1757123413.926:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.959976 kernel: audit: backlog limit exceeded Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.930000 audit: BPF prog-id=43 op=LOAD Sep 6 01:50:13.931000 audit: BPF prog-id=33 op=UNLOAD Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit: BPF prog-id=44 op=LOAD Sep 6 01:50:13.932000 audit: BPF prog-id=24 op=UNLOAD Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit: BPF prog-id=45 op=LOAD Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.933000 audit: BPF prog-id=46 op=LOAD Sep 6 01:50:13.933000 audit: BPF prog-id=25 op=UNLOAD Sep 6 01:50:13.933000 audit: BPF prog-id=26 op=UNLOAD Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.938000 audit: BPF prog-id=47 op=LOAD Sep 6 01:50:13.938000 audit: BPF prog-id=27 op=UNLOAD Sep 6 01:50:13.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.944000 audit: BPF prog-id=48 op=LOAD Sep 6 01:50:13.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit: BPF prog-id=51 op=LOAD Sep 6 01:50:13.965000 audit: BPF prog-id=35 op=UNLOAD Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit: BPF prog-id=52 op=LOAD Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.965000 audit: BPF prog-id=53 op=LOAD Sep 6 01:50:13.965000 audit: BPF prog-id=36 op=UNLOAD Sep 6 01:50:13.965000 audit: BPF prog-id=37 op=UNLOAD Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.968000 audit: BPF prog-id=54 op=LOAD Sep 6 01:50:13.968000 audit: BPF prog-id=41 op=UNLOAD Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit: BPF prog-id=55 op=LOAD Sep 6 01:50:13.970000 audit: BPF prog-id=30 op=UNLOAD Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit: BPF prog-id=56 op=LOAD Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:13.970000 audit: BPF prog-id=57 op=LOAD Sep 6 01:50:13.970000 audit: BPF prog-id=31 op=UNLOAD Sep 6 01:50:13.970000 audit: BPF prog-id=32 op=UNLOAD Sep 6 01:50:13.996699 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Sep 6 01:50:13.996850 systemd[1]: kubelet.service: Failed with result 'signal'. Sep 6 01:50:13.997313 systemd[1]: Stopped kubelet.service. Sep 6 01:50:13.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 6 01:50:14.001109 systemd[1]: Starting kubelet.service... Sep 6 01:50:14.233583 systemd[1]: Started kubelet.service. Sep 6 01:50:14.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:14.345301 kubelet[1612]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:50:14.345924 kubelet[1612]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 01:50:14.346065 kubelet[1612]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:50:14.346329 kubelet[1612]: I0906 01:50:14.346272 1612 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 01:50:14.717228 kubelet[1612]: I0906 01:50:14.717161 1612 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 6 01:50:14.717228 kubelet[1612]: I0906 01:50:14.717204 1612 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 01:50:14.717595 kubelet[1612]: I0906 01:50:14.717563 1612 server.go:954] "Client rotation is on, will bootstrap in background" Sep 6 01:50:14.755019 kubelet[1612]: E0906 01:50:14.754953 1612 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.243.73.226:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:14.762748 kubelet[1612]: I0906 01:50:14.762701 1612 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 01:50:14.770854 kubelet[1612]: E0906 01:50:14.770753 1612 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 01:50:14.770854 kubelet[1612]: I0906 01:50:14.770806 1612 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 01:50:14.777971 kubelet[1612]: I0906 01:50:14.777941 1612 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 01:50:14.781468 kubelet[1612]: I0906 01:50:14.781412 1612 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 01:50:14.781902 kubelet[1612]: I0906 01:50:14.781626 1612 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-lvab0.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 01:50:14.782245 kubelet[1612]: I0906 01:50:14.782220 1612 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 01:50:14.782383 kubelet[1612]: I0906 01:50:14.782361 1612 container_manager_linux.go:304] "Creating device plugin manager" Sep 6 01:50:14.782742 kubelet[1612]: I0906 01:50:14.782719 1612 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:50:14.787628 kubelet[1612]: I0906 01:50:14.787599 1612 kubelet.go:446] "Attempting to sync node with API server" Sep 6 01:50:14.787823 kubelet[1612]: I0906 01:50:14.787797 1612 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 01:50:14.787979 kubelet[1612]: I0906 01:50:14.787954 1612 kubelet.go:352] "Adding apiserver pod source" Sep 6 01:50:14.788129 kubelet[1612]: I0906 01:50:14.788105 1612 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 01:50:14.797429 kubelet[1612]: I0906 01:50:14.797050 1612 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 01:50:14.797730 kubelet[1612]: I0906 01:50:14.797690 1612 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 01:50:14.801284 kubelet[1612]: W0906 01:50:14.801248 1612 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 6 01:50:14.808390 kubelet[1612]: I0906 01:50:14.806103 1612 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 01:50:14.808390 kubelet[1612]: I0906 01:50:14.806166 1612 server.go:1287] "Started kubelet" Sep 6 01:50:14.808390 kubelet[1612]: W0906 01:50:14.806375 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.243.73.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-lvab0.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:14.808390 kubelet[1612]: E0906 01:50:14.806452 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.243.73.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-lvab0.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:14.814974 kubelet[1612]: W0906 01:50:14.814917 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.243.73.226:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:14.815191 kubelet[1612]: E0906 01:50:14.815156 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.243.73.226:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:14.815596 kubelet[1612]: I0906 01:50:14.815448 1612 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 01:50:14.820103 kubelet[1612]: I0906 01:50:14.819999 1612 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 01:50:14.820777 kubelet[1612]: I0906 01:50:14.820746 1612 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 01:50:14.821000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:14.821000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:50:14.821000 audit[1612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aaf320 a1=c000a77638 a2=c000aaf2f0 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:50:14.823442 kubelet[1612]: I0906 01:50:14.823401 1612 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 01:50:14.822000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:14.822000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:50:14.822000 audit[1612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a75ce0 a1=c000a77650 a2=c000aaf3b0 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.822000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:50:14.824009 kubelet[1612]: I0906 01:50:14.823979 1612 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 01:50:14.824260 kubelet[1612]: I0906 01:50:14.824236 1612 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 01:50:14.827425 kubelet[1612]: E0906 01:50:14.826057 1612 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.243.73.226:6443/api/v1/namespaces/default/events\": dial tcp 10.243.73.226:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-lvab0.gb1.brightbox.com.18628e6fa60a7b7f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-lvab0.gb1.brightbox.com,UID:srv-lvab0.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-lvab0.gb1.brightbox.com,},FirstTimestamp:2025-09-06 01:50:14.806133631 +0000 UTC m=+0.565090519,LastTimestamp:2025-09-06 01:50:14.806133631 +0000 UTC m=+0.565090519,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-lvab0.gb1.brightbox.com,}" Sep 6 01:50:14.830175 kubelet[1612]: I0906 01:50:14.830147 1612 server.go:479] "Adding debug handlers to kubelet server" Sep 6 01:50:14.832862 kubelet[1612]: I0906 01:50:14.830612 1612 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 01:50:14.833187 kubelet[1612]: I0906 01:50:14.830630 1612 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 01:50:14.833495 kubelet[1612]: I0906 01:50:14.833456 1612 reconciler.go:26] "Reconciler: start to sync state" Sep 6 01:50:14.833633 kubelet[1612]: E0906 01:50:14.830825 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-lvab0.gb1.brightbox.com\" not found" Sep 6 01:50:14.833756 kubelet[1612]: I0906 01:50:14.830637 1612 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 01:50:14.834464 kubelet[1612]: W0906 01:50:14.834414 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.243.73.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:14.834639 kubelet[1612]: E0906 01:50:14.834605 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.243.73.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:14.834881 kubelet[1612]: E0906 01:50:14.834834 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.73.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-lvab0.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.73.226:6443: connect: connection refused" interval="200ms" Sep 6 01:50:14.836408 kubelet[1612]: E0906 01:50:14.836363 1612 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 01:50:14.837521 kubelet[1612]: I0906 01:50:14.837498 1612 factory.go:221] Registration of the containerd container factory successfully Sep 6 01:50:14.837644 kubelet[1612]: I0906 01:50:14.837622 1612 factory.go:221] Registration of the systemd container factory successfully Sep 6 01:50:14.837978 kubelet[1612]: I0906 01:50:14.837941 1612 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 01:50:14.846000 audit[1624]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.846000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcec8c6500 a2=0 a3=7ffcec8c64ec items=0 ppid=1612 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:50:14.848000 audit[1625]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.848000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff89cb9a10 a2=0 a3=7fff89cb99fc items=0 ppid=1612 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:50:14.856000 audit[1629]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.856000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeec07f140 a2=0 a3=7ffeec07f12c items=0 ppid=1612 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:50:14.859000 audit[1631]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.859000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffff8f8b10 a2=0 a3=7fffff8f8afc items=0 ppid=1612 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:50:14.886000 audit[1636]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.886000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc84e5bbd0 a2=0 a3=7ffc84e5bbbc items=0 ppid=1612 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 6 01:50:14.888661 kubelet[1612]: I0906 01:50:14.885098 1612 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 01:50:14.888661 kubelet[1612]: I0906 01:50:14.885123 1612 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 01:50:14.888661 kubelet[1612]: I0906 01:50:14.885161 1612 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:50:14.889649 kubelet[1612]: I0906 01:50:14.889612 1612 policy_none.go:49] "None policy: Start" Sep 6 01:50:14.889732 kubelet[1612]: I0906 01:50:14.889659 1612 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 01:50:14.889732 kubelet[1612]: I0906 01:50:14.889696 1612 state_mem.go:35] "Initializing new in-memory state store" Sep 6 01:50:14.890223 kubelet[1612]: I0906 01:50:14.890183 1612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 01:50:14.890000 audit[1639]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:14.890000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8d27be10 a2=0 a3=7ffd8d27bdfc items=0 ppid=1612 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 6 01:50:14.892979 kubelet[1612]: I0906 01:50:14.892943 1612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 01:50:14.893081 kubelet[1612]: I0906 01:50:14.893006 1612 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 6 01:50:14.893081 kubelet[1612]: I0906 01:50:14.893059 1612 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 01:50:14.893197 kubelet[1612]: I0906 01:50:14.893079 1612 kubelet.go:2382] "Starting kubelet main sync loop" Sep 6 01:50:14.893271 kubelet[1612]: E0906 01:50:14.893198 1612 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 01:50:14.894988 kubelet[1612]: W0906 01:50:14.894954 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.243.73.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:14.895093 kubelet[1612]: E0906 01:50:14.895002 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.243.73.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:14.896000 audit[1640]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.896000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4a8b5ad0 a2=0 a3=7fff4a8b5abc items=0 ppid=1612 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:50:14.897000 audit[1641]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:14.897000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5594dd20 a2=0 a3=7fff5594dd0c items=0 ppid=1612 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 6 01:50:14.900711 systemd[1]: Created slice kubepods.slice. Sep 6 01:50:14.900000 audit[1642]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.900000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1d3551e0 a2=0 a3=7fff1d3551cc items=0 ppid=1612 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:50:14.903000 audit[1643]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:14.903000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffef1857c40 a2=0 a3=7ffef1857c2c items=0 ppid=1612 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 6 01:50:14.905000 audit[1644]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:14.905000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7fb8dbb0 a2=0 a3=7ffd7fb8db9c items=0 ppid=1612 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:50:14.911594 systemd[1]: Created slice kubepods-burstable.slice. Sep 6 01:50:14.912000 audit[1645]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:14.912000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3aa5b990 a2=0 a3=7ffd3aa5b97c items=0 ppid=1612 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 6 01:50:14.917716 systemd[1]: Created slice kubepods-besteffort.slice. Sep 6 01:50:14.927566 kubelet[1612]: I0906 01:50:14.927520 1612 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 01:50:14.926000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:14.926000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:50:14.926000 audit[1612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ce58f0 a1=c000e23410 a2=c000ce58c0 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:14.926000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:50:14.929363 kubelet[1612]: I0906 01:50:14.929333 1612 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 01:50:14.929798 kubelet[1612]: I0906 01:50:14.929776 1612 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 01:50:14.931227 kubelet[1612]: E0906 01:50:14.931190 1612 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 01:50:14.931443 kubelet[1612]: I0906 01:50:14.930008 1612 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 01:50:14.931985 kubelet[1612]: I0906 01:50:14.931954 1612 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 01:50:14.933131 kubelet[1612]: E0906 01:50:14.933099 1612 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-lvab0.gb1.brightbox.com\" not found" Sep 6 01:50:15.006274 systemd[1]: Created slice kubepods-burstable-pod0a92a3f32c99e94756145dddf196f1c7.slice. Sep 6 01:50:15.019301 kubelet[1612]: E0906 01:50:15.019234 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.024311 systemd[1]: Created slice kubepods-burstable-pod62657f8505540f6bc49b6413ca66f35f.slice. Sep 6 01:50:15.027443 kubelet[1612]: E0906 01:50:15.027411 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.030811 systemd[1]: Created slice kubepods-burstable-podb0bc9d5f5beb2e22783329c4b041eed9.slice. Sep 6 01:50:15.034663 kubelet[1612]: I0906 01:50:15.034410 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a92a3f32c99e94756145dddf196f1c7-ca-certs\") pod \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" (UID: \"0a92a3f32c99e94756145dddf196f1c7\") " pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034663 kubelet[1612]: I0906 01:50:15.034461 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-k8s-certs\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034663 kubelet[1612]: I0906 01:50:15.034522 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034663 kubelet[1612]: I0906 01:50:15.034574 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b0bc9d5f5beb2e22783329c4b041eed9-kubeconfig\") pod \"kube-scheduler-srv-lvab0.gb1.brightbox.com\" (UID: \"b0bc9d5f5beb2e22783329c4b041eed9\") " pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034663 kubelet[1612]: I0906 01:50:15.034600 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a92a3f32c99e94756145dddf196f1c7-k8s-certs\") pod \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" (UID: \"0a92a3f32c99e94756145dddf196f1c7\") " pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034996 kubelet[1612]: I0906 01:50:15.034627 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a92a3f32c99e94756145dddf196f1c7-usr-share-ca-certificates\") pod \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" (UID: \"0a92a3f32c99e94756145dddf196f1c7\") " pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034996 kubelet[1612]: I0906 01:50:15.034760 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-ca-certs\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034996 kubelet[1612]: I0906 01:50:15.034787 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-flexvolume-dir\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.034996 kubelet[1612]: I0906 01:50:15.034838 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-kubeconfig\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.036012 kubelet[1612]: E0906 01:50:15.035828 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.73.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-lvab0.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.73.226:6443: connect: connection refused" interval="400ms" Sep 6 01:50:15.036269 kubelet[1612]: I0906 01:50:15.036243 1612 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.036635 kubelet[1612]: E0906 01:50:15.036608 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.037411 kubelet[1612]: E0906 01:50:15.037370 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.243.73.226:6443/api/v1/nodes\": dial tcp 10.243.73.226:6443: connect: connection refused" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.109942 update_engine[1195]: I0906 01:50:15.109761 1195 update_attempter.cc:509] Updating boot flags... Sep 6 01:50:15.243143 kubelet[1612]: I0906 01:50:15.243101 1612 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.243649 kubelet[1612]: E0906 01:50:15.243614 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.243.73.226:6443/api/v1/nodes\": dial tcp 10.243.73.226:6443: connect: connection refused" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.322373 env[1201]: time="2025-09-06T01:50:15.322211259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-lvab0.gb1.brightbox.com,Uid:0a92a3f32c99e94756145dddf196f1c7,Namespace:kube-system,Attempt:0,}" Sep 6 01:50:15.330091 env[1201]: time="2025-09-06T01:50:15.329745584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-lvab0.gb1.brightbox.com,Uid:62657f8505540f6bc49b6413ca66f35f,Namespace:kube-system,Attempt:0,}" Sep 6 01:50:15.338555 env[1201]: time="2025-09-06T01:50:15.338462074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-lvab0.gb1.brightbox.com,Uid:b0bc9d5f5beb2e22783329c4b041eed9,Namespace:kube-system,Attempt:0,}" Sep 6 01:50:15.436931 kubelet[1612]: E0906 01:50:15.436866 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.73.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-lvab0.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.73.226:6443: connect: connection refused" interval="800ms" Sep 6 01:50:15.649004 kubelet[1612]: I0906 01:50:15.648384 1612 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:15.649004 kubelet[1612]: E0906 01:50:15.648857 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.243.73.226:6443/api/v1/nodes\": dial tcp 10.243.73.226:6443: connect: connection refused" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:16.096863 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1034606986.mount: Deactivated successfully. Sep 6 01:50:16.113594 env[1201]: time="2025-09-06T01:50:16.113523722Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.120227 env[1201]: time="2025-09-06T01:50:16.120144390Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.121840 env[1201]: time="2025-09-06T01:50:16.121803149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.130025 env[1201]: time="2025-09-06T01:50:16.129958808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.131566 env[1201]: time="2025-09-06T01:50:16.131466413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.133585 env[1201]: time="2025-09-06T01:50:16.133549608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.138613 env[1201]: time="2025-09-06T01:50:16.138578210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.140014 env[1201]: time="2025-09-06T01:50:16.139981279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.158527 env[1201]: time="2025-09-06T01:50:16.158432843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.164855 env[1201]: time="2025-09-06T01:50:16.162063501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.165036 kubelet[1612]: W0906 01:50:16.163440 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.243.73.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-lvab0.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:16.165036 kubelet[1612]: E0906 01:50:16.163535 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.243.73.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-lvab0.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:16.169577 env[1201]: time="2025-09-06T01:50:16.164880922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.169687 env[1201]: time="2025-09-06T01:50:16.169584663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:16.181177 env[1201]: time="2025-09-06T01:50:16.180782672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:16.181177 env[1201]: time="2025-09-06T01:50:16.180881996Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:16.181177 env[1201]: time="2025-09-06T01:50:16.180901475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:16.181802 env[1201]: time="2025-09-06T01:50:16.181657573Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82a0e79b7e34d83517ba76ced094d687e79706b32db639c93f4582ef9ad5e109 pid=1666 runtime=io.containerd.runc.v2 Sep 6 01:50:16.222701 systemd[1]: Started cri-containerd-82a0e79b7e34d83517ba76ced094d687e79706b32db639c93f4582ef9ad5e109.scope. Sep 6 01:50:16.238923 kubelet[1612]: E0906 01:50:16.238666 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.73.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-lvab0.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.73.226:6443: connect: connection refused" interval="1.6s" Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit: BPF prog-id=58 op=LOAD Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1666 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613065373962376533346438333531376261373663656430393464 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1666 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613065373962376533346438333531376261373663656430393464 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.264000 audit: BPF prog-id=59 op=LOAD Sep 6 01:50:16.264000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000364ef0 items=0 ppid=1666 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613065373962376533346438333531376261373663656430393464 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit: BPF prog-id=60 op=LOAD Sep 6 01:50:16.265000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000364f38 items=0 ppid=1666 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613065373962376533346438333531376261373663656430393464 Sep 6 01:50:16.265000 audit: BPF prog-id=60 op=UNLOAD Sep 6 01:50:16.265000 audit: BPF prog-id=59 op=UNLOAD Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.265000 audit: BPF prog-id=61 op=LOAD Sep 6 01:50:16.265000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000365348 items=0 ppid=1666 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832613065373962376533346438333531376261373663656430393464 Sep 6 01:50:16.286030 env[1201]: time="2025-09-06T01:50:16.280738703Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:16.286030 env[1201]: time="2025-09-06T01:50:16.280857164Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:16.286030 env[1201]: time="2025-09-06T01:50:16.280926164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:16.286030 env[1201]: time="2025-09-06T01:50:16.281398627Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d2ce6604fe87bd1b4d6db8024e26459432c43826e5ddd8d865018a8374f248e pid=1702 runtime=io.containerd.runc.v2 Sep 6 01:50:16.307770 env[1201]: time="2025-09-06T01:50:16.307640257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:16.307966 env[1201]: time="2025-09-06T01:50:16.307802931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:16.307966 env[1201]: time="2025-09-06T01:50:16.307886506Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:16.308362 env[1201]: time="2025-09-06T01:50:16.308300884Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9901eb6d73ed9f19a952114ae2cb8c9b58f4daef5d6778eabe1d8295f742f45d pid=1722 runtime=io.containerd.runc.v2 Sep 6 01:50:16.328335 env[1201]: time="2025-09-06T01:50:16.328272197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-lvab0.gb1.brightbox.com,Uid:0a92a3f32c99e94756145dddf196f1c7,Namespace:kube-system,Attempt:0,} returns sandbox id \"82a0e79b7e34d83517ba76ced094d687e79706b32db639c93f4582ef9ad5e109\"" Sep 6 01:50:16.337070 kubelet[1612]: W0906 01:50:16.337003 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.243.73.226:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:16.337275 kubelet[1612]: E0906 01:50:16.337101 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.243.73.226:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:16.343720 systemd[1]: Started cri-containerd-9901eb6d73ed9f19a952114ae2cb8c9b58f4daef5d6778eabe1d8295f742f45d.scope. Sep 6 01:50:16.359590 env[1201]: time="2025-09-06T01:50:16.359447293Z" level=info msg="CreateContainer within sandbox \"82a0e79b7e34d83517ba76ced094d687e79706b32db639c93f4582ef9ad5e109\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 6 01:50:16.367709 kubelet[1612]: W0906 01:50:16.365171 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.243.73.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:16.367709 kubelet[1612]: E0906 01:50:16.365274 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.243.73.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.368000 audit: BPF prog-id=62 op=LOAD Sep 6 01:50:16.371000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.371000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303165623664373365643966313961393532313134616532636238 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303165623664373365643966313961393532313134616532636238 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.373000 audit: BPF prog-id=63 op=LOAD Sep 6 01:50:16.373000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c0660 items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303165623664373365643966313961393532313134616532636238 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.374000 audit: BPF prog-id=64 op=LOAD Sep 6 01:50:16.374000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c06a8 items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303165623664373365643966313961393532313134616532636238 Sep 6 01:50:16.375000 audit: BPF prog-id=64 op=UNLOAD Sep 6 01:50:16.375000 audit: BPF prog-id=63 op=UNLOAD Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.376000 audit: BPF prog-id=65 op=LOAD Sep 6 01:50:16.381720 systemd[1]: Started cri-containerd-2d2ce6604fe87bd1b4d6db8024e26459432c43826e5ddd8d865018a8374f248e.scope. Sep 6 01:50:16.376000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0ab8 items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303165623664373365643966313961393532313134616532636238 Sep 6 01:50:16.398309 kubelet[1612]: W0906 01:50:16.398149 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.243.73.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:16.398309 kubelet[1612]: E0906 01:50:16.398249 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.243.73.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.401000 audit: BPF prog-id=66 op=LOAD Sep 6 01:50:16.403000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.403000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1702 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326365363630346665383762643162346436646238303234653236 Sep 6 01:50:16.403000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.403000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1702 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326365363630346665383762643162346436646238303234653236 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.404000 audit: BPF prog-id=67 op=LOAD Sep 6 01:50:16.404000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000208360 items=0 ppid=1702 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326365363630346665383762643162346436646238303234653236 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.405000 audit: BPF prog-id=68 op=LOAD Sep 6 01:50:16.405000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002083a8 items=0 ppid=1702 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326365363630346665383762643162346436646238303234653236 Sep 6 01:50:16.406000 audit: BPF prog-id=68 op=UNLOAD Sep 6 01:50:16.406000 audit: BPF prog-id=67 op=UNLOAD Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.406000 audit: BPF prog-id=69 op=LOAD Sep 6 01:50:16.406000 audit[1721]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002087b8 items=0 ppid=1702 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326365363630346665383762643162346436646238303234653236 Sep 6 01:50:16.417522 env[1201]: time="2025-09-06T01:50:16.417428089Z" level=info msg="CreateContainer within sandbox \"82a0e79b7e34d83517ba76ced094d687e79706b32db639c93f4582ef9ad5e109\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"601543d394649e5e33ea60df3ac8cfa94821fbe9b05082301415d6059e04208c\"" Sep 6 01:50:16.419770 env[1201]: time="2025-09-06T01:50:16.419728579Z" level=info msg="StartContainer for \"601543d394649e5e33ea60df3ac8cfa94821fbe9b05082301415d6059e04208c\"" Sep 6 01:50:16.446667 systemd[1]: Started cri-containerd-601543d394649e5e33ea60df3ac8cfa94821fbe9b05082301415d6059e04208c.scope. Sep 6 01:50:16.458983 kubelet[1612]: I0906 01:50:16.458452 1612 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:16.458983 kubelet[1612]: E0906 01:50:16.458941 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.243.73.226:6443/api/v1/nodes\": dial tcp 10.243.73.226:6443: connect: connection refused" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:16.472319 env[1201]: time="2025-09-06T01:50:16.472252854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-lvab0.gb1.brightbox.com,Uid:b0bc9d5f5beb2e22783329c4b041eed9,Namespace:kube-system,Attempt:0,} returns sandbox id \"9901eb6d73ed9f19a952114ae2cb8c9b58f4daef5d6778eabe1d8295f742f45d\"" Sep 6 01:50:16.477538 env[1201]: time="2025-09-06T01:50:16.477492947Z" level=info msg="CreateContainer within sandbox \"9901eb6d73ed9f19a952114ae2cb8c9b58f4daef5d6778eabe1d8295f742f45d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit: BPF prog-id=70 op=LOAD Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1666 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313534336433393436343965356533336561363064663361633863 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1666 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313534336433393436343965356533336561363064663361633863 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.500000 audit: BPF prog-id=71 op=LOAD Sep 6 01:50:16.500000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218380 items=0 ppid=1666 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313534336433393436343965356533336561363064663361633863 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit: BPF prog-id=72 op=LOAD Sep 6 01:50:16.501000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002183c8 items=0 ppid=1666 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313534336433393436343965356533336561363064663361633863 Sep 6 01:50:16.501000 audit: BPF prog-id=72 op=UNLOAD Sep 6 01:50:16.501000 audit: BPF prog-id=71 op=UNLOAD Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.501000 audit: BPF prog-id=73 op=LOAD Sep 6 01:50:16.501000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002187d8 items=0 ppid=1666 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313534336433393436343965356533336561363064663361633863 Sep 6 01:50:16.514076 env[1201]: time="2025-09-06T01:50:16.511199922Z" level=info msg="CreateContainer within sandbox \"9901eb6d73ed9f19a952114ae2cb8c9b58f4daef5d6778eabe1d8295f742f45d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"43e2647cbb5721bfd43d0ff704240050350ac649bbbbeb6dbf305be30d5d4d12\"" Sep 6 01:50:16.514076 env[1201]: time="2025-09-06T01:50:16.512092298Z" level=info msg="StartContainer for \"43e2647cbb5721bfd43d0ff704240050350ac649bbbbeb6dbf305be30d5d4d12\"" Sep 6 01:50:16.516219 env[1201]: time="2025-09-06T01:50:16.516177635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-lvab0.gb1.brightbox.com,Uid:62657f8505540f6bc49b6413ca66f35f,Namespace:kube-system,Attempt:0,} returns sandbox id \"2d2ce6604fe87bd1b4d6db8024e26459432c43826e5ddd8d865018a8374f248e\"" Sep 6 01:50:16.520892 env[1201]: time="2025-09-06T01:50:16.520850788Z" level=info msg="CreateContainer within sandbox \"2d2ce6604fe87bd1b4d6db8024e26459432c43826e5ddd8d865018a8374f248e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 6 01:50:16.543355 systemd[1]: Started cri-containerd-43e2647cbb5721bfd43d0ff704240050350ac649bbbbeb6dbf305be30d5d4d12.scope. Sep 6 01:50:16.544154 env[1201]: time="2025-09-06T01:50:16.544091279Z" level=info msg="CreateContainer within sandbox \"2d2ce6604fe87bd1b4d6db8024e26459432c43826e5ddd8d865018a8374f248e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b0c9383056bdbb6a1c18a5ddf6faf4857803fef20a086300813e20f2b60fe2c9\"" Sep 6 01:50:16.548622 env[1201]: time="2025-09-06T01:50:16.548571388Z" level=info msg="StartContainer for \"b0c9383056bdbb6a1c18a5ddf6faf4857803fef20a086300813e20f2b60fe2c9\"" Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.574000 audit: BPF prog-id=74 op=LOAD Sep 6 01:50:16.576000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.576000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1722 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653236343763626235373231626664343364306666373034323430 Sep 6 01:50:16.576000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.576000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1722 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653236343763626235373231626664343364306666373034323430 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.577000 audit: BPF prog-id=75 op=LOAD Sep 6 01:50:16.577000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00037c680 items=0 ppid=1722 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653236343763626235373231626664343364306666373034323430 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.578000 audit: BPF prog-id=76 op=LOAD Sep 6 01:50:16.578000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00037c6c8 items=0 ppid=1722 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653236343763626235373231626664343364306666373034323430 Sep 6 01:50:16.579000 audit: BPF prog-id=76 op=UNLOAD Sep 6 01:50:16.579000 audit: BPF prog-id=75 op=UNLOAD Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.579000 audit: BPF prog-id=77 op=LOAD Sep 6 01:50:16.579000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00037cad8 items=0 ppid=1722 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653236343763626235373231626664343364306666373034323430 Sep 6 01:50:16.592433 env[1201]: time="2025-09-06T01:50:16.592359977Z" level=info msg="StartContainer for \"601543d394649e5e33ea60df3ac8cfa94821fbe9b05082301415d6059e04208c\" returns successfully" Sep 6 01:50:16.603010 systemd[1]: Started cri-containerd-b0c9383056bdbb6a1c18a5ddf6faf4857803fef20a086300813e20f2b60fe2c9.scope. Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.632000 audit: BPF prog-id=78 op=LOAD Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1702 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633933383330353662646262366131633138613564646636666166 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1702 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633933383330353662646262366131633138613564646636666166 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit: BPF prog-id=79 op=LOAD Sep 6 01:50:16.633000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000300430 items=0 ppid=1702 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633933383330353662646262366131633138613564646636666166 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit: BPF prog-id=80 op=LOAD Sep 6 01:50:16.633000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300478 items=0 ppid=1702 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633933383330353662646262366131633138613564646636666166 Sep 6 01:50:16.633000 audit: BPF prog-id=80 op=UNLOAD Sep 6 01:50:16.633000 audit: BPF prog-id=79 op=UNLOAD Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:16.633000 audit: BPF prog-id=81 op=LOAD Sep 6 01:50:16.633000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000300888 items=0 ppid=1702 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:16.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633933383330353662646262366131633138613564646636666166 Sep 6 01:50:16.679265 env[1201]: time="2025-09-06T01:50:16.679209976Z" level=info msg="StartContainer for \"43e2647cbb5721bfd43d0ff704240050350ac649bbbbeb6dbf305be30d5d4d12\" returns successfully" Sep 6 01:50:16.693291 env[1201]: time="2025-09-06T01:50:16.693235989Z" level=info msg="StartContainer for \"b0c9383056bdbb6a1c18a5ddf6faf4857803fef20a086300813e20f2b60fe2c9\" returns successfully" Sep 6 01:50:16.856700 kubelet[1612]: E0906 01:50:16.856581 1612 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.243.73.226:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:16.906744 kubelet[1612]: E0906 01:50:16.904450 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:16.911779 kubelet[1612]: E0906 01:50:16.911750 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:16.914397 kubelet[1612]: E0906 01:50:16.914371 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:17.839987 kubelet[1612]: E0906 01:50:17.839861 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.73.226:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-lvab0.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.73.226:6443: connect: connection refused" interval="3.2s" Sep 6 01:50:17.882000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:17.882000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00099af60 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:17.882000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:17.883000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:17.883000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003d93c0 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:17.883000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:17.918642 kubelet[1612]: E0906 01:50:17.918591 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:17.918920 kubelet[1612]: E0906 01:50:17.918894 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:18.062743 kubelet[1612]: I0906 01:50:18.062691 1612 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:18.063165 kubelet[1612]: E0906 01:50:18.063132 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.243.73.226:6443/api/v1/nodes\": dial tcp 10.243.73.226:6443: connect: connection refused" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:18.140988 kubelet[1612]: W0906 01:50:18.140762 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.243.73.226:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:18.140988 kubelet[1612]: E0906 01:50:18.140829 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.243.73.226:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:18.169055 kubelet[1612]: W0906 01:50:18.169004 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.243.73.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-lvab0.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:18.169419 kubelet[1612]: E0906 01:50:18.169379 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.243.73.226:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-lvab0.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:18.503109 kubelet[1612]: W0906 01:50:18.503055 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.243.73.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:18.503436 kubelet[1612]: E0906 01:50:18.503404 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.243.73.226:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:18.923001 kubelet[1612]: E0906 01:50:18.922874 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:19.463740 kubelet[1612]: W0906 01:50:19.463668 1612 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.243.73.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.73.226:6443: connect: connection refused Sep 6 01:50:19.464051 kubelet[1612]: E0906 01:50:19.464016 1612 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.243.73.226:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.243.73.226:6443: connect: connection refused" logger="UnhandledError" Sep 6 01:50:20.656603 kubelet[1612]: E0906 01:50:20.656553 1612 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.266983 kubelet[1612]: I0906 01:50:21.266937 1612 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.524000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526394 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.527831 kernel: kauditd_printk_skb: 598 callbacks suppressed Sep 6 01:50:21.527998 kernel: audit: type=1400 audit(1757123421.524:542): avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526394 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.524000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0042379e0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.541505 kernel: audit: type=1300 audit(1757123421.524:542): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0042379e0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.541683 kernel: audit: type=1327 audit(1757123421.524:542): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.542000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.553928 kernel: audit: type=1400 audit(1757123421.542:543): avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.554085 kernel: audit: type=1300 audit(1757123421.542:543): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c006932390 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.542000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c006932390 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.542000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.569514 kernel: audit: type=1327 audit(1757123421.542:543): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.577000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.577000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c006b53920 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.593953 kernel: audit: type=1400 audit(1757123421.577:544): avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.594044 kernel: audit: type=1300 audit(1757123421.577:544): arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c006b53920 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.611495 kernel: audit: type=1327 audit(1757123421.577:544): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.577000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.577000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c006b53960 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.622581 kernel: audit: type=1400 audit(1757123421.577:545): avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.577000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.577000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c006a57530 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.578000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:21.578000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c006a57800 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:50:21.578000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:50:21.730554 kubelet[1612]: E0906 01:50:21.730503 1612 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-lvab0.gb1.brightbox.com\" not found" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.818078 kubelet[1612]: I0906 01:50:21.817897 1612 apiserver.go:52] "Watching apiserver" Sep 6 01:50:21.834775 kubelet[1612]: I0906 01:50:21.834722 1612 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 01:50:21.848856 kubelet[1612]: I0906 01:50:21.848810 1612 kubelet_node_status.go:78] "Successfully registered node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.931671 kubelet[1612]: I0906 01:50:21.931627 1612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.940625 kubelet[1612]: E0906 01:50:21.940419 1612 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-lvab0.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.940625 kubelet[1612]: I0906 01:50:21.940620 1612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.953426 kubelet[1612]: E0906 01:50:21.953377 1612 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.953814 kubelet[1612]: I0906 01:50:21.953786 1612 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:21.957164 kubelet[1612]: E0906 01:50:21.956519 1612 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:23.787379 systemd[1]: Reloading. Sep 6 01:50:23.902914 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2025-09-06T01:50:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 6 01:50:23.903621 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2025-09-06T01:50:23Z" level=info msg="torcx already run" Sep 6 01:50:24.024527 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 6 01:50:24.024568 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 6 01:50:24.056011 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.171000 audit: BPF prog-id=82 op=LOAD Sep 6 01:50:24.171000 audit: BPF prog-id=43 op=UNLOAD Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.172000 audit: BPF prog-id=83 op=LOAD Sep 6 01:50:24.172000 audit: BPF prog-id=44 op=UNLOAD Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit: BPF prog-id=84 op=LOAD Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit: BPF prog-id=85 op=LOAD Sep 6 01:50:24.173000 audit: BPF prog-id=45 op=UNLOAD Sep 6 01:50:24.173000 audit: BPF prog-id=46 op=UNLOAD Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.174000 audit: BPF prog-id=86 op=LOAD Sep 6 01:50:24.174000 audit: BPF prog-id=78 op=UNLOAD Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.177000 audit: BPF prog-id=87 op=LOAD Sep 6 01:50:24.177000 audit: BPF prog-id=47 op=UNLOAD Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.180000 audit: BPF prog-id=88 op=LOAD Sep 6 01:50:24.180000 audit: BPF prog-id=48 op=UNLOAD Sep 6 01:50:24.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit: BPF prog-id=89 op=LOAD Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.183000 audit: BPF prog-id=90 op=LOAD Sep 6 01:50:24.183000 audit: BPF prog-id=49 op=UNLOAD Sep 6 01:50:24.183000 audit: BPF prog-id=50 op=UNLOAD Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.185000 audit: BPF prog-id=91 op=LOAD Sep 6 01:50:24.185000 audit: BPF prog-id=70 op=UNLOAD Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.186000 audit: BPF prog-id=92 op=LOAD Sep 6 01:50:24.186000 audit: BPF prog-id=66 op=UNLOAD Sep 6 01:50:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.188000 audit: BPF prog-id=93 op=LOAD Sep 6 01:50:24.188000 audit: BPF prog-id=58 op=UNLOAD Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit: BPF prog-id=94 op=LOAD Sep 6 01:50:24.190000 audit: BPF prog-id=51 op=UNLOAD Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit: BPF prog-id=95 op=LOAD Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit: BPF prog-id=96 op=LOAD Sep 6 01:50:24.191000 audit: BPF prog-id=52 op=UNLOAD Sep 6 01:50:24.191000 audit: BPF prog-id=53 op=UNLOAD Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.191000 audit: BPF prog-id=97 op=LOAD Sep 6 01:50:24.191000 audit: BPF prog-id=74 op=UNLOAD Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.194000 audit: BPF prog-id=98 op=LOAD Sep 6 01:50:24.194000 audit: BPF prog-id=62 op=UNLOAD Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.195000 audit: BPF prog-id=99 op=LOAD Sep 6 01:50:24.195000 audit: BPF prog-id=54 op=UNLOAD Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit: BPF prog-id=100 op=LOAD Sep 6 01:50:24.197000 audit: BPF prog-id=55 op=UNLOAD Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit: BPF prog-id=101 op=LOAD Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:24.197000 audit: BPF prog-id=102 op=LOAD Sep 6 01:50:24.197000 audit: BPF prog-id=56 op=UNLOAD Sep 6 01:50:24.197000 audit: BPF prog-id=57 op=UNLOAD Sep 6 01:50:24.215359 systemd[1]: Stopping kubelet.service... Sep 6 01:50:24.242107 systemd[1]: kubelet.service: Deactivated successfully. Sep 6 01:50:24.242666 systemd[1]: Stopped kubelet.service. Sep 6 01:50:24.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:24.243140 systemd[1]: kubelet.service: Consumed 1.122s CPU time. Sep 6 01:50:24.247127 systemd[1]: Starting kubelet.service... Sep 6 01:50:24.819000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526425 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 6 01:50:24.819000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c5cc40 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:24.819000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:25.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:25.563097 systemd[1]: Started kubelet.service. Sep 6 01:50:25.670970 kubelet[1976]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:50:25.673040 kubelet[1976]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 6 01:50:25.673136 kubelet[1976]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 6 01:50:25.673369 kubelet[1976]: I0906 01:50:25.673325 1976 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 6 01:50:25.691050 kubelet[1976]: I0906 01:50:25.690979 1976 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 6 01:50:25.691348 kubelet[1976]: I0906 01:50:25.691325 1976 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 6 01:50:25.691840 kubelet[1976]: I0906 01:50:25.691816 1976 server.go:954] "Client rotation is on, will bootstrap in background" Sep 6 01:50:25.693617 kubelet[1976]: I0906 01:50:25.693554 1976 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Sep 6 01:50:25.701853 kubelet[1976]: I0906 01:50:25.701811 1976 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 6 01:50:25.708267 kubelet[1976]: E0906 01:50:25.708226 1976 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 6 01:50:25.708502 kubelet[1976]: I0906 01:50:25.708460 1976 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 6 01:50:25.714694 kubelet[1976]: I0906 01:50:25.714650 1976 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 6 01:50:25.715240 kubelet[1976]: I0906 01:50:25.715199 1976 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 6 01:50:25.715727 kubelet[1976]: I0906 01:50:25.715357 1976 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-lvab0.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 6 01:50:25.715973 kubelet[1976]: I0906 01:50:25.715949 1976 topology_manager.go:138] "Creating topology manager with none policy" Sep 6 01:50:25.716090 kubelet[1976]: I0906 01:50:25.716069 1976 container_manager_linux.go:304] "Creating device plugin manager" Sep 6 01:50:25.716259 kubelet[1976]: I0906 01:50:25.716238 1976 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:50:25.716626 kubelet[1976]: I0906 01:50:25.716603 1976 kubelet.go:446] "Attempting to sync node with API server" Sep 6 01:50:25.716755 kubelet[1976]: I0906 01:50:25.716732 1976 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 6 01:50:25.716880 kubelet[1976]: I0906 01:50:25.716858 1976 kubelet.go:352] "Adding apiserver pod source" Sep 6 01:50:25.717072 kubelet[1976]: I0906 01:50:25.717050 1976 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 6 01:50:25.722752 kubelet[1976]: I0906 01:50:25.722718 1976 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 6 01:50:25.723429 kubelet[1976]: I0906 01:50:25.723404 1976 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 6 01:50:25.724131 kubelet[1976]: I0906 01:50:25.724108 1976 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 6 01:50:25.724264 kubelet[1976]: I0906 01:50:25.724242 1976 server.go:1287] "Started kubelet" Sep 6 01:50:25.748000 audit[1976]: AVC avc: denied { mac_admin } for pid=1976 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:25.748000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:50:25.748000 audit[1976]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003ae780 a1=c000abaff0 a2=c0003ae630 a3=25 items=0 ppid=1 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:25.750384 kubelet[1976]: I0906 01:50:25.750345 1976 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 6 01:50:25.748000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:50:25.749000 audit[1976]: AVC avc: denied { mac_admin } for pid=1976 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:25.749000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:50:25.749000 audit[1976]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00063c9a0 a1=c000abb008 a2=c0003ae900 a3=25 items=0 ppid=1 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:25.749000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:50:25.751014 kubelet[1976]: I0906 01:50:25.750984 1976 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 6 01:50:25.751165 kubelet[1976]: I0906 01:50:25.751142 1976 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 6 01:50:25.759514 kubelet[1976]: I0906 01:50:25.757698 1976 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 6 01:50:25.772969 kubelet[1976]: I0906 01:50:25.772897 1976 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 6 01:50:25.798423 kubelet[1976]: I0906 01:50:25.798376 1976 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 6 01:50:25.798783 kubelet[1976]: I0906 01:50:25.778303 1976 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 6 01:50:25.799226 kubelet[1976]: I0906 01:50:25.773841 1976 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 6 01:50:25.799420 kubelet[1976]: I0906 01:50:25.778316 1976 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 6 01:50:25.799602 kubelet[1976]: I0906 01:50:25.784119 1976 server.go:479] "Adding debug handlers to kubelet server" Sep 6 01:50:25.800952 kubelet[1976]: I0906 01:50:25.797007 1976 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 6 01:50:25.803013 kubelet[1976]: I0906 01:50:25.802974 1976 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 6 01:50:25.803150 kubelet[1976]: I0906 01:50:25.803129 1976 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 6 01:50:25.803319 kubelet[1976]: I0906 01:50:25.803296 1976 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 6 01:50:25.803426 kubelet[1976]: I0906 01:50:25.803400 1976 kubelet.go:2382] "Starting kubelet main sync loop" Sep 6 01:50:25.803653 kubelet[1976]: E0906 01:50:25.803615 1976 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 6 01:50:25.804031 kubelet[1976]: I0906 01:50:25.804010 1976 reconciler.go:26] "Reconciler: start to sync state" Sep 6 01:50:25.804190 kubelet[1976]: E0906 01:50:25.778509 1976 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-lvab0.gb1.brightbox.com\" not found" Sep 6 01:50:25.819439 kubelet[1976]: I0906 01:50:25.817895 1976 factory.go:221] Registration of the systemd container factory successfully Sep 6 01:50:25.819439 kubelet[1976]: I0906 01:50:25.818030 1976 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 6 01:50:25.829632 kubelet[1976]: I0906 01:50:25.829443 1976 factory.go:221] Registration of the containerd container factory successfully Sep 6 01:50:25.830164 kubelet[1976]: E0906 01:50:25.830135 1976 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 6 01:50:25.902125 kubelet[1976]: I0906 01:50:25.902091 1976 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 6 01:50:25.902356 kubelet[1976]: I0906 01:50:25.902331 1976 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 6 01:50:25.902516 kubelet[1976]: I0906 01:50:25.902450 1976 state_mem.go:36] "Initialized new in-memory state store" Sep 6 01:50:25.902921 kubelet[1976]: I0906 01:50:25.902895 1976 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 6 01:50:25.903070 kubelet[1976]: I0906 01:50:25.903029 1976 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 6 01:50:25.903254 kubelet[1976]: I0906 01:50:25.903227 1976 policy_none.go:49] "None policy: Start" Sep 6 01:50:25.903389 kubelet[1976]: I0906 01:50:25.903367 1976 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 6 01:50:25.903521 kubelet[1976]: I0906 01:50:25.903500 1976 state_mem.go:35] "Initializing new in-memory state store" Sep 6 01:50:25.903841 kubelet[1976]: I0906 01:50:25.903818 1976 state_mem.go:75] "Updated machine memory state" Sep 6 01:50:25.904877 kubelet[1976]: E0906 01:50:25.904853 1976 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Sep 6 01:50:25.913439 kubelet[1976]: I0906 01:50:25.913413 1976 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 6 01:50:25.913838 kubelet[1976]: I0906 01:50:25.913804 1976 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 6 01:50:25.912000 audit[1976]: AVC avc: denied { mac_admin } for pid=1976 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:25.912000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 6 01:50:25.912000 audit[1976]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000db37a0 a1=c000abba40 a2=c000db3770 a3=25 items=0 ppid=1 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:25.912000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 6 01:50:25.914861 kubelet[1976]: I0906 01:50:25.914838 1976 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 6 01:50:25.915007 kubelet[1976]: I0906 01:50:25.914965 1976 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 6 01:50:25.915662 kubelet[1976]: I0906 01:50:25.915425 1976 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 6 01:50:25.916994 kubelet[1976]: E0906 01:50:25.916662 1976 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 6 01:50:26.044822 kubelet[1976]: I0906 01:50:26.044448 1976 kubelet_node_status.go:75] "Attempting to register node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.059708 kubelet[1976]: I0906 01:50:26.059065 1976 kubelet_node_status.go:124] "Node was previously registered" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.059708 kubelet[1976]: I0906 01:50:26.059211 1976 kubelet_node_status.go:78] "Successfully registered node" node="srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.107298 kubelet[1976]: I0906 01:50:26.106727 1976 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.111882 kubelet[1976]: I0906 01:50:26.111412 1976 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.111882 kubelet[1976]: I0906 01:50:26.111843 1976 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.119122 kubelet[1976]: W0906 01:50:26.119067 1976 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:50:26.119306 kubelet[1976]: W0906 01:50:26.119145 1976 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:50:26.119366 kubelet[1976]: W0906 01:50:26.119321 1976 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:50:26.207312 kubelet[1976]: I0906 01:50:26.207241 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-flexvolume-dir\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207564 kubelet[1976]: I0906 01:50:26.207340 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-k8s-certs\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207564 kubelet[1976]: I0906 01:50:26.207417 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-kubeconfig\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207564 kubelet[1976]: I0906 01:50:26.207518 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b0bc9d5f5beb2e22783329c4b041eed9-kubeconfig\") pod \"kube-scheduler-srv-lvab0.gb1.brightbox.com\" (UID: \"b0bc9d5f5beb2e22783329c4b041eed9\") " pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207734 kubelet[1976]: I0906 01:50:26.207607 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a92a3f32c99e94756145dddf196f1c7-ca-certs\") pod \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" (UID: \"0a92a3f32c99e94756145dddf196f1c7\") " pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207734 kubelet[1976]: I0906 01:50:26.207647 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-ca-certs\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207734 kubelet[1976]: I0906 01:50:26.207709 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a92a3f32c99e94756145dddf196f1c7-k8s-certs\") pod \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" (UID: \"0a92a3f32c99e94756145dddf196f1c7\") " pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207896 kubelet[1976]: I0906 01:50:26.207794 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a92a3f32c99e94756145dddf196f1c7-usr-share-ca-certificates\") pod \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" (UID: \"0a92a3f32c99e94756145dddf196f1c7\") " pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.207896 kubelet[1976]: I0906 01:50:26.207867 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/62657f8505540f6bc49b6413ca66f35f-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-lvab0.gb1.brightbox.com\" (UID: \"62657f8505540f6bc49b6413ca66f35f\") " pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.722549 kubelet[1976]: I0906 01:50:26.722432 1976 apiserver.go:52] "Watching apiserver" Sep 6 01:50:26.800283 kubelet[1976]: I0906 01:50:26.800187 1976 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 6 01:50:26.856353 kubelet[1976]: I0906 01:50:26.856231 1976 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.857160 kubelet[1976]: I0906 01:50:26.857132 1976 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.866065 kubelet[1976]: W0906 01:50:26.866008 1976 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:50:26.866361 kubelet[1976]: E0906 01:50:26.866093 1976 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-lvab0.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.886757 kubelet[1976]: W0906 01:50:26.886688 1976 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Sep 6 01:50:26.887262 kubelet[1976]: E0906 01:50:26.887226 1976 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-lvab0.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" Sep 6 01:50:26.940246 kubelet[1976]: I0906 01:50:26.940082 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-lvab0.gb1.brightbox.com" podStartSLOduration=0.939880911 podStartE2EDuration="939.880911ms" podCreationTimestamp="2025-09-06 01:50:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:50:26.919916939 +0000 UTC m=+1.342536720" watchObservedRunningTime="2025-09-06 01:50:26.939880911 +0000 UTC m=+1.362500689" Sep 6 01:50:26.940708 kubelet[1976]: I0906 01:50:26.940446 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-lvab0.gb1.brightbox.com" podStartSLOduration=0.940412628 podStartE2EDuration="940.412628ms" podCreationTimestamp="2025-09-06 01:50:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:50:26.935391207 +0000 UTC m=+1.358010989" watchObservedRunningTime="2025-09-06 01:50:26.940412628 +0000 UTC m=+1.363032406" Sep 6 01:50:28.627000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.635524 kernel: kauditd_printk_skb: 269 callbacks suppressed Sep 6 01:50:28.635782 kernel: audit: type=1400 audit(1757123428.627:798): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.634000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.647343 kernel: audit: type=1400 audit(1757123428.634:799): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.647495 kernel: audit: type=1300 audit(1757123428.634:799): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad2ac0 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.634000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad2ac0 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:28.662003 kernel: audit: type=1327 audit(1757123428.634:799): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:28.662136 kernel: audit: type=1400 audit(1757123428.634:800): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.634000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.634000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad2b00 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.675646 kernel: audit: type=1300 audit(1757123428.634:800): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad2b00 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.675790 kernel: audit: type=1327 audit(1757123428.634:800): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:28.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:28.634000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.688059 kernel: audit: type=1400 audit(1757123428.634:801): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:50:28.634000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad2b40 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.697504 kernel: audit: type=1300 audit(1757123428.634:801): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad2b40 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:28.627000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a538a0 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:50:28.706562 kernel: audit: type=1327 audit(1757123428.634:801): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:28.627000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:50:29.001992 kubelet[1976]: I0906 01:50:29.001822 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-lvab0.gb1.brightbox.com" podStartSLOduration=3.001713661 podStartE2EDuration="3.001713661s" podCreationTimestamp="2025-09-06 01:50:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:50:26.959890384 +0000 UTC m=+1.382510180" watchObservedRunningTime="2025-09-06 01:50:29.001713661 +0000 UTC m=+3.424333433" Sep 6 01:50:29.435617 kubelet[1976]: I0906 01:50:29.435449 1976 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 6 01:50:29.436584 env[1201]: time="2025-09-06T01:50:29.436435169Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 6 01:50:29.437232 kubelet[1976]: I0906 01:50:29.436887 1976 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 6 01:50:30.318257 systemd[1]: Created slice kubepods-besteffort-poda3da918d_9615_4709_b8b4_6a0947e60dc0.slice. Sep 6 01:50:30.337871 kubelet[1976]: I0906 01:50:30.337785 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a3da918d-9615-4709-b8b4-6a0947e60dc0-kube-proxy\") pod \"kube-proxy-9twq6\" (UID: \"a3da918d-9615-4709-b8b4-6a0947e60dc0\") " pod="kube-system/kube-proxy-9twq6" Sep 6 01:50:30.337871 kubelet[1976]: I0906 01:50:30.337863 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a3da918d-9615-4709-b8b4-6a0947e60dc0-xtables-lock\") pod \"kube-proxy-9twq6\" (UID: \"a3da918d-9615-4709-b8b4-6a0947e60dc0\") " pod="kube-system/kube-proxy-9twq6" Sep 6 01:50:30.338835 kubelet[1976]: I0906 01:50:30.337931 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a3da918d-9615-4709-b8b4-6a0947e60dc0-lib-modules\") pod \"kube-proxy-9twq6\" (UID: \"a3da918d-9615-4709-b8b4-6a0947e60dc0\") " pod="kube-system/kube-proxy-9twq6" Sep 6 01:50:30.338835 kubelet[1976]: I0906 01:50:30.337970 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zn7lm\" (UniqueName: \"kubernetes.io/projected/a3da918d-9615-4709-b8b4-6a0947e60dc0-kube-api-access-zn7lm\") pod \"kube-proxy-9twq6\" (UID: \"a3da918d-9615-4709-b8b4-6a0947e60dc0\") " pod="kube-system/kube-proxy-9twq6" Sep 6 01:50:30.463041 kubelet[1976]: I0906 01:50:30.462973 1976 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 6 01:50:30.510372 systemd[1]: Created slice kubepods-besteffort-podf6be5e63_c4d6_4f16_8480_7a9840536db5.slice. Sep 6 01:50:30.538765 kubelet[1976]: I0906 01:50:30.538634 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f6be5e63-c4d6-4f16-8480-7a9840536db5-var-lib-calico\") pod \"tigera-operator-755d956888-x2dzl\" (UID: \"f6be5e63-c4d6-4f16-8480-7a9840536db5\") " pod="tigera-operator/tigera-operator-755d956888-x2dzl" Sep 6 01:50:30.539070 kubelet[1976]: I0906 01:50:30.538773 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wzzn7\" (UniqueName: \"kubernetes.io/projected/f6be5e63-c4d6-4f16-8480-7a9840536db5-kube-api-access-wzzn7\") pod \"tigera-operator-755d956888-x2dzl\" (UID: \"f6be5e63-c4d6-4f16-8480-7a9840536db5\") " pod="tigera-operator/tigera-operator-755d956888-x2dzl" Sep 6 01:50:30.629318 env[1201]: time="2025-09-06T01:50:30.629131421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9twq6,Uid:a3da918d-9615-4709-b8b4-6a0947e60dc0,Namespace:kube-system,Attempt:0,}" Sep 6 01:50:30.677932 env[1201]: time="2025-09-06T01:50:30.677677736Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:30.677932 env[1201]: time="2025-09-06T01:50:30.677870718Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:30.677932 env[1201]: time="2025-09-06T01:50:30.677889378Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:30.678908 env[1201]: time="2025-09-06T01:50:30.678845164Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8fed9da55c6a4299d496c25172e4d86ae6364808c174568d074020f715278c00 pid=2027 runtime=io.containerd.runc.v2 Sep 6 01:50:30.717919 systemd[1]: Started cri-containerd-8fed9da55c6a4299d496c25172e4d86ae6364808c174568d074020f715278c00.scope. Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.755000 audit: BPF prog-id=103 op=LOAD Sep 6 01:50:30.757000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.757000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2027 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656439646135356336613432393964343936633235313732653464 Sep 6 01:50:30.757000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.757000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2027 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656439646135356336613432393964343936633235313732653464 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.758000 audit: BPF prog-id=104 op=LOAD Sep 6 01:50:30.758000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000347ce0 items=0 ppid=2027 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656439646135356336613432393964343936633235313732653464 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.759000 audit: BPF prog-id=105 op=LOAD Sep 6 01:50:30.759000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000347d28 items=0 ppid=2027 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656439646135356336613432393964343936633235313732653464 Sep 6 01:50:30.760000 audit: BPF prog-id=105 op=UNLOAD Sep 6 01:50:30.760000 audit: BPF prog-id=104 op=UNLOAD Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { perfmon } for pid=2037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit[2037]: AVC avc: denied { bpf } for pid=2037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.761000 audit: BPF prog-id=106 op=LOAD Sep 6 01:50:30.761000 audit[2037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2138 items=0 ppid=2027 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656439646135356336613432393964343936633235313732653464 Sep 6 01:50:30.785589 env[1201]: time="2025-09-06T01:50:30.785518274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9twq6,Uid:a3da918d-9615-4709-b8b4-6a0947e60dc0,Namespace:kube-system,Attempt:0,} returns sandbox id \"8fed9da55c6a4299d496c25172e4d86ae6364808c174568d074020f715278c00\"" Sep 6 01:50:30.791767 env[1201]: time="2025-09-06T01:50:30.791620553Z" level=info msg="CreateContainer within sandbox \"8fed9da55c6a4299d496c25172e4d86ae6364808c174568d074020f715278c00\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 6 01:50:30.812198 env[1201]: time="2025-09-06T01:50:30.812125215Z" level=info msg="CreateContainer within sandbox \"8fed9da55c6a4299d496c25172e4d86ae6364808c174568d074020f715278c00\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b909674e9b0df2a59d62d4179d9676d45d54510d1a2855f4d32c3d5678008bc6\"" Sep 6 01:50:30.815721 env[1201]: time="2025-09-06T01:50:30.815680285Z" level=info msg="StartContainer for \"b909674e9b0df2a59d62d4179d9676d45d54510d1a2855f4d32c3d5678008bc6\"" Sep 6 01:50:30.817316 env[1201]: time="2025-09-06T01:50:30.817279287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-x2dzl,Uid:f6be5e63-c4d6-4f16-8480-7a9840536db5,Namespace:tigera-operator,Attempt:0,}" Sep 6 01:50:30.841041 env[1201]: time="2025-09-06T01:50:30.840885253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:30.841457 env[1201]: time="2025-09-06T01:50:30.841393479Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:30.841804 env[1201]: time="2025-09-06T01:50:30.841741020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:30.843303 env[1201]: time="2025-09-06T01:50:30.843226087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef4038f8c4112137c688ab2b4dc271b0f186b158ed7f0117092e9ce189dff9a8 pid=2081 runtime=io.containerd.runc.v2 Sep 6 01:50:30.847692 systemd[1]: Started cri-containerd-b909674e9b0df2a59d62d4179d9676d45d54510d1a2855f4d32c3d5678008bc6.scope. Sep 6 01:50:30.903860 systemd[1]: Started cri-containerd-ef4038f8c4112137c688ab2b4dc271b0f186b158ed7f0117092e9ce189dff9a8.scope. Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5700eee218 items=0 ppid=2027 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303936373465396230646632613539643632643431373964393637 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit: BPF prog-id=107 op=LOAD Sep 6 01:50:30.912000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000198898 items=0 ppid=2027 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303936373465396230646632613539643632643431373964393637 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.912000 audit: BPF prog-id=108 op=LOAD Sep 6 01:50:30.912000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001988e8 items=0 ppid=2027 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303936373465396230646632613539643632643431373964393637 Sep 6 01:50:30.913000 audit: BPF prog-id=108 op=UNLOAD Sep 6 01:50:30.913000 audit: BPF prog-id=107 op=UNLOAD Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.913000 audit: BPF prog-id=109 op=LOAD Sep 6 01:50:30.913000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000198978 items=0 ppid=2027 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303936373465396230646632613539643632643431373964393637 Sep 6 01:50:30.953250 env[1201]: time="2025-09-06T01:50:30.953174398Z" level=info msg="StartContainer for \"b909674e9b0df2a59d62d4179d9676d45d54510d1a2855f4d32c3d5678008bc6\" returns successfully" Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.956000 audit: BPF prog-id=110 op=LOAD Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2081 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343033386638633431313231333763363838616232623464633237 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2081 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343033386638633431313231333763363838616232623464633237 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit: BPF prog-id=111 op=LOAD Sep 6 01:50:30.957000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000288c60 items=0 ppid=2081 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343033386638633431313231333763363838616232623464633237 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit: BPF prog-id=112 op=LOAD Sep 6 01:50:30.957000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000288ca8 items=0 ppid=2081 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343033386638633431313231333763363838616232623464633237 Sep 6 01:50:30.957000 audit: BPF prog-id=112 op=UNLOAD Sep 6 01:50:30.957000 audit: BPF prog-id=111 op=UNLOAD Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:30.957000 audit: BPF prog-id=113 op=LOAD Sep 6 01:50:30.957000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002890b8 items=0 ppid=2081 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:30.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343033386638633431313231333763363838616232623464633237 Sep 6 01:50:31.002189 env[1201]: time="2025-09-06T01:50:31.002088256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-x2dzl,Uid:f6be5e63-c4d6-4f16-8480-7a9840536db5,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ef4038f8c4112137c688ab2b4dc271b0f186b158ed7f0117092e9ce189dff9a8\"" Sep 6 01:50:31.006536 env[1201]: time="2025-09-06T01:50:31.006466553Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 6 01:50:31.412000 audit[2169]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.412000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc95ab0020 a2=0 a3=7ffc95ab000c items=0 ppid=2097 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:50:31.415000 audit[2171]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.415000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff611a790 a2=0 a3=7ffff611a77c items=0 ppid=2097 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 6 01:50:31.416000 audit[2172]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.416000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd5180130 a2=0 a3=7ffcd518011c items=0 ppid=2097 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:50:31.427000 audit[2173]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.427000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff23d6fcb0 a2=0 a3=7fff23d6fc9c items=0 ppid=2097 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:50:31.427000 audit[2174]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.427000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe30110d80 a2=0 a3=7ffe30110d6c items=0 ppid=2097 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 6 01:50:31.429000 audit[2175]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.429000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff71a5fc00 a2=0 a3=7fff71a5fbec items=0 ppid=2097 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 6 01:50:31.476124 systemd[1]: run-containerd-runc-k8s.io-8fed9da55c6a4299d496c25172e4d86ae6364808c174568d074020f715278c00-runc.ci4gFw.mount: Deactivated successfully. Sep 6 01:50:31.519000 audit[2176]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.519000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc84e715e0 a2=0 a3=7ffc84e715cc items=0 ppid=2097 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:50:31.528000 audit[2178]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.528000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffccc0a1760 a2=0 a3=7ffccc0a174c items=0 ppid=2097 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 6 01:50:31.535000 audit[2181]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.535000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdeea88bf0 a2=0 a3=7ffdeea88bdc items=0 ppid=2097 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 6 01:50:31.537000 audit[2182]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.537000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1cbefef0 a2=0 a3=7fff1cbefedc items=0 ppid=2097 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:50:31.541000 audit[2184]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.541000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda24b5d30 a2=0 a3=7ffda24b5d1c items=0 ppid=2097 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:50:31.543000 audit[2185]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.543000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed0e4bf40 a2=0 a3=7ffed0e4bf2c items=0 ppid=2097 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:50:31.546000 audit[2187]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.546000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd67fac100 a2=0 a3=7ffd67fac0ec items=0 ppid=2097 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:50:31.553000 audit[2190]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.553000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8da63350 a2=0 a3=7ffc8da6333c items=0 ppid=2097 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 6 01:50:31.556000 audit[2191]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.556000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd59cc6c40 a2=0 a3=7ffd59cc6c2c items=0 ppid=2097 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:50:31.559000 audit[2193]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.559000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe55ad07f0 a2=0 a3=7ffe55ad07dc items=0 ppid=2097 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:50:31.561000 audit[2194]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.561000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff13cf2820 a2=0 a3=7fff13cf280c items=0 ppid=2097 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:50:31.565000 audit[2196]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.565000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd4c2ce00 a2=0 a3=7fffd4c2cdec items=0 ppid=2097 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:50:31.571000 audit[2199]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.571000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddd1eddd0 a2=0 a3=7ffddd1eddbc items=0 ppid=2097 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:50:31.577000 audit[2202]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.577000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0850c140 a2=0 a3=7ffc0850c12c items=0 ppid=2097 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:50:31.581000 audit[2203]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.581000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe27fdfe00 a2=0 a3=7ffe27fdfdec items=0 ppid=2097 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:50:31.586000 audit[2205]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.586000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff21194fa0 a2=0 a3=7fff21194f8c items=0 ppid=2097 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:50:31.592000 audit[2208]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.592000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe49271cc0 a2=0 a3=7ffe49271cac items=0 ppid=2097 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:50:31.594000 audit[2209]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.594000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe744322e0 a2=0 a3=7ffe744322cc items=0 ppid=2097 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:50:31.598000 audit[2211]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 6 01:50:31.598000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe8d5d5570 a2=0 a3=7ffe8d5d555c items=0 ppid=2097 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:50:31.640000 audit[2217]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:31.640000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe7d691b00 a2=0 a3=7ffe7d691aec items=0 ppid=2097 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:31.651000 audit[2217]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:31.651000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe7d691b00 a2=0 a3=7ffe7d691aec items=0 ppid=2097 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:31.654000 audit[2222]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.654000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe3a2accf0 a2=0 a3=7ffe3a2accdc items=0 ppid=2097 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 6 01:50:31.659000 audit[2224]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.659000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff870b0d20 a2=0 a3=7fff870b0d0c items=0 ppid=2097 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 6 01:50:31.665000 audit[2227]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.665000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1e178170 a2=0 a3=7ffd1e17815c items=0 ppid=2097 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 6 01:50:31.669000 audit[2228]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.669000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9d145fb0 a2=0 a3=7ffd9d145f9c items=0 ppid=2097 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 6 01:50:31.673000 audit[2230]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.673000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff77603a60 a2=0 a3=7fff77603a4c items=0 ppid=2097 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 6 01:50:31.675000 audit[2231]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.675000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde977fe30 a2=0 a3=7ffde977fe1c items=0 ppid=2097 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 6 01:50:31.679000 audit[2233]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.679000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffebfe4830 a2=0 a3=7fffebfe481c items=0 ppid=2097 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 6 01:50:31.684000 audit[2236]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.684000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffddefafaa0 a2=0 a3=7ffddefafa8c items=0 ppid=2097 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 6 01:50:31.685000 audit[2237]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.685000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3ca6ef70 a2=0 a3=7ffc3ca6ef5c items=0 ppid=2097 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 6 01:50:31.689000 audit[2239]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.689000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd628dbad0 a2=0 a3=7ffd628dbabc items=0 ppid=2097 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 6 01:50:31.691000 audit[2240]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.691000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceff69390 a2=0 a3=7ffceff6937c items=0 ppid=2097 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 6 01:50:31.695000 audit[2242]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.695000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd3f56d30 a2=0 a3=7ffcd3f56d1c items=0 ppid=2097 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 6 01:50:31.701000 audit[2245]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.701000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5e190ed0 a2=0 a3=7ffc5e190ebc items=0 ppid=2097 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 6 01:50:31.707000 audit[2248]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.707000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6daf30b0 a2=0 a3=7ffc6daf309c items=0 ppid=2097 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 6 01:50:31.709000 audit[2249]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.709000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd732be100 a2=0 a3=7ffd732be0ec items=0 ppid=2097 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 6 01:50:31.713000 audit[2251]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.713000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff074e63c0 a2=0 a3=7fff074e63ac items=0 ppid=2097 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:50:31.722000 audit[2254]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.722000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd121a9ba0 a2=0 a3=7ffd121a9b8c items=0 ppid=2097 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 6 01:50:31.724000 audit[2255]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.724000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc1dde0c0 a2=0 a3=7fffc1dde0ac items=0 ppid=2097 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 6 01:50:31.728000 audit[2257]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.728000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda5d9a520 a2=0 a3=7ffda5d9a50c items=0 ppid=2097 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 6 01:50:31.730000 audit[2258]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.730000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee5b110f0 a2=0 a3=7ffee5b110dc items=0 ppid=2097 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 6 01:50:31.737000 audit[2260]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.737000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe4ec2fcd0 a2=0 a3=7ffe4ec2fcbc items=0 ppid=2097 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:50:31.742000 audit[2263]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 6 01:50:31.742000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2b0831c0 a2=0 a3=7ffd2b0831ac items=0 ppid=2097 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 6 01:50:31.748000 audit[2265]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:50:31.748000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd589d0ae0 a2=0 a3=7ffd589d0acc items=0 ppid=2097 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.748000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:31.750000 audit[2265]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 6 01:50:31.750000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd589d0ae0 a2=0 a3=7ffd589d0acc items=0 ppid=2097 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:31.750000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:31.913163 kubelet[1976]: I0906 01:50:31.913052 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-9twq6" podStartSLOduration=1.913032753 podStartE2EDuration="1.913032753s" podCreationTimestamp="2025-09-06 01:50:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:50:31.912701487 +0000 UTC m=+6.335321261" watchObservedRunningTime="2025-09-06 01:50:31.913032753 +0000 UTC m=+6.335652531" Sep 6 01:50:33.071888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3585135331.mount: Deactivated successfully. Sep 6 01:50:34.485963 env[1201]: time="2025-09-06T01:50:34.485877882Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:34.488781 env[1201]: time="2025-09-06T01:50:34.488732818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:34.491552 env[1201]: time="2025-09-06T01:50:34.491509142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:34.495206 env[1201]: time="2025-09-06T01:50:34.495170706Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:34.496338 env[1201]: time="2025-09-06T01:50:34.496279310Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 6 01:50:34.502602 env[1201]: time="2025-09-06T01:50:34.502533456Z" level=info msg="CreateContainer within sandbox \"ef4038f8c4112137c688ab2b4dc271b0f186b158ed7f0117092e9ce189dff9a8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 6 01:50:34.516650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount685810919.mount: Deactivated successfully. Sep 6 01:50:34.524467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2842642780.mount: Deactivated successfully. Sep 6 01:50:34.530930 env[1201]: time="2025-09-06T01:50:34.530868637Z" level=info msg="CreateContainer within sandbox \"ef4038f8c4112137c688ab2b4dc271b0f186b158ed7f0117092e9ce189dff9a8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e7ac690014b12c49ee4cbe660935d6891f73719cdacfcdd8b180e160839217ce\"" Sep 6 01:50:34.533510 env[1201]: time="2025-09-06T01:50:34.532546132Z" level=info msg="StartContainer for \"e7ac690014b12c49ee4cbe660935d6891f73719cdacfcdd8b180e160839217ce\"" Sep 6 01:50:34.569386 systemd[1]: Started cri-containerd-e7ac690014b12c49ee4cbe660935d6891f73719cdacfcdd8b180e160839217ce.scope. Sep 6 01:50:34.613204 kernel: kauditd_printk_skb: 312 callbacks suppressed Sep 6 01:50:34.613935 kernel: audit: type=1400 audit(1757123434.604:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.624517 kernel: audit: type=1400 audit(1757123434.604:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.631838 kernel: audit: type=1400 audit(1757123434.604:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.638053 kernel: audit: type=1400 audit(1757123434.604:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.647922 kernel: audit: type=1400 audit(1757123434.604:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.648457 kernel: audit: type=1400 audit(1757123434.604:900): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.648550 kernel: audit: type=1400 audit(1757123434.604:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.657946 kernel: audit: type=1400 audit(1757123434.604:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.658047 kernel: audit: type=1400 audit(1757123434.604:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.669559 kernel: audit: type=1400 audit(1757123434.604:904): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.604000 audit: BPF prog-id=114 op=LOAD Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2081 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616336393030313462313263343965653463626536363039333564 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2081 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616336393030313462313263343965653463626536363039333564 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.618000 audit: BPF prog-id=115 op=LOAD Sep 6 01:50:34.618000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00032ce50 items=0 ppid=2081 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616336393030313462313263343965653463626536363039333564 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.632000 audit: BPF prog-id=116 op=LOAD Sep 6 01:50:34.632000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00032ce98 items=0 ppid=2081 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:34.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616336393030313462313263343965653463626536363039333564 Sep 6 01:50:34.635000 audit: BPF prog-id=116 op=UNLOAD Sep 6 01:50:34.635000 audit: BPF prog-id=115 op=UNLOAD Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:34.636000 audit: BPF prog-id=117 op=LOAD Sep 6 01:50:34.636000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00032d2a8 items=0 ppid=2081 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:34.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616336393030313462313263343965653463626536363039333564 Sep 6 01:50:34.687770 env[1201]: time="2025-09-06T01:50:34.687659966Z" level=info msg="StartContainer for \"e7ac690014b12c49ee4cbe660935d6891f73719cdacfcdd8b180e160839217ce\" returns successfully" Sep 6 01:50:34.903378 kubelet[1976]: I0906 01:50:34.901828 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-755d956888-x2dzl" podStartSLOduration=1.407402166 podStartE2EDuration="4.901746832s" podCreationTimestamp="2025-09-06 01:50:30 +0000 UTC" firstStartedPulling="2025-09-06 01:50:31.004206768 +0000 UTC m=+5.426826544" lastFinishedPulling="2025-09-06 01:50:34.498551436 +0000 UTC m=+8.921171210" observedRunningTime="2025-09-06 01:50:34.901548152 +0000 UTC m=+9.324167973" watchObservedRunningTime="2025-09-06 01:50:34.901746832 +0000 UTC m=+9.324366606" Sep 6 01:50:41.965554 sudo[1359]: pam_unix(sudo:session): session closed for user root Sep 6 01:50:41.982442 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 6 01:50:41.982646 kernel: audit: type=1106 audit(1757123441.965:913): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:50:41.965000 audit[1359]: USER_END pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:50:41.965000 audit[1359]: CRED_DISP pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:50:41.992576 kernel: audit: type=1104 audit(1757123441.965:914): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 6 01:50:42.143443 sshd[1356]: pam_unix(sshd:session): session closed for user core Sep 6 01:50:42.149000 audit[1356]: USER_END pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:50:42.155639 systemd-logind[1194]: Session 7 logged out. Waiting for processes to exit. Sep 6 01:50:42.158301 systemd[1]: sshd@6-10.243.73.226:22-139.178.89.65:56360.service: Deactivated successfully. Sep 6 01:50:42.180034 systemd[1]: session-7.scope: Deactivated successfully. Sep 6 01:50:42.180555 kernel: audit: type=1106 audit(1757123442.149:915): pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:50:42.181468 systemd[1]: session-7.scope: Consumed 6.974s CPU time. Sep 6 01:50:42.150000 audit[1356]: CRED_DISP pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:50:42.185891 systemd-logind[1194]: Removed session 7. Sep 6 01:50:42.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.243.73.226:22-139.178.89.65:56360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:42.193076 kernel: audit: type=1104 audit(1757123442.150:916): pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:50:42.193195 kernel: audit: type=1131 audit(1757123442.171:917): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.243.73.226:22-139.178.89.65:56360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:50:43.452000 audit[2350]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:43.460509 kernel: audit: type=1325 audit(1757123443.452:918): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:43.452000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdb266bbf0 a2=0 a3=7ffdb266bbdc items=0 ppid=2097 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:43.471509 kernel: audit: type=1300 audit(1757123443.452:918): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdb266bbf0 a2=0 a3=7ffdb266bbdc items=0 ppid=2097 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:43.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:43.478505 kernel: audit: type=1327 audit(1757123443.452:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:43.484000 audit[2350]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:43.489503 kernel: audit: type=1325 audit(1757123443.484:919): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:43.484000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb266bbf0 a2=0 a3=0 items=0 ppid=2097 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:43.503511 kernel: audit: type=1300 audit(1757123443.484:919): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb266bbf0 a2=0 a3=0 items=0 ppid=2097 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:43.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:43.539000 audit[2352]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:43.539000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffdb299bf0 a2=0 a3=7fffdb299bdc items=0 ppid=2097 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:43.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:43.544000 audit[2352]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:43.544000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffdb299bf0 a2=0 a3=0 items=0 ppid=2097 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:43.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:46.083000 audit[2356]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:46.083000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff4a1bee00 a2=0 a3=7fff4a1bedec items=0 ppid=2097 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:46.089000 audit[2356]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:46.089000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff4a1bee00 a2=0 a3=0 items=0 ppid=2097 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:46.132000 audit[2358]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:46.132000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffef6579fc0 a2=0 a3=7ffef6579fac items=0 ppid=2097 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:46.138000 audit[2358]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:46.138000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef6579fc0 a2=0 a3=0 items=0 ppid=2097 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:46.229180 systemd[1]: Created slice kubepods-besteffort-podf7d87aec_a602_42cf_a53c_f35e569d1420.slice. Sep 6 01:50:46.254176 kubelet[1976]: I0906 01:50:46.254095 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ppcjk\" (UniqueName: \"kubernetes.io/projected/f7d87aec-a602-42cf-a53c-f35e569d1420-kube-api-access-ppcjk\") pod \"calico-typha-8558694659-p9msw\" (UID: \"f7d87aec-a602-42cf-a53c-f35e569d1420\") " pod="calico-system/calico-typha-8558694659-p9msw" Sep 6 01:50:46.254870 kubelet[1976]: I0906 01:50:46.254190 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f7d87aec-a602-42cf-a53c-f35e569d1420-typha-certs\") pod \"calico-typha-8558694659-p9msw\" (UID: \"f7d87aec-a602-42cf-a53c-f35e569d1420\") " pod="calico-system/calico-typha-8558694659-p9msw" Sep 6 01:50:46.254870 kubelet[1976]: I0906 01:50:46.254231 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f7d87aec-a602-42cf-a53c-f35e569d1420-tigera-ca-bundle\") pod \"calico-typha-8558694659-p9msw\" (UID: \"f7d87aec-a602-42cf-a53c-f35e569d1420\") " pod="calico-system/calico-typha-8558694659-p9msw" Sep 6 01:50:46.536882 systemd[1]: Created slice kubepods-besteffort-poded6c4c64_3775_4024_99ce_fa4a1e7e65cd.slice. Sep 6 01:50:46.547137 env[1201]: time="2025-09-06T01:50:46.546558491Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8558694659-p9msw,Uid:f7d87aec-a602-42cf-a53c-f35e569d1420,Namespace:calico-system,Attempt:0,}" Sep 6 01:50:46.556165 kubelet[1976]: I0906 01:50:46.556112 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-xtables-lock\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.556409 kubelet[1976]: I0906 01:50:46.556380 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-cni-bin-dir\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.556583 kubelet[1976]: I0906 01:50:46.556555 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-cni-net-dir\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.556830 kubelet[1976]: I0906 01:50:46.556778 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-var-run-calico\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.556902 kubelet[1976]: I0906 01:50:46.556856 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xsr8n\" (UniqueName: \"kubernetes.io/projected/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-kube-api-access-xsr8n\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.556965 kubelet[1976]: I0906 01:50:46.556936 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-lib-modules\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.557038 kubelet[1976]: I0906 01:50:46.556974 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-var-lib-calico\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.557132 kubelet[1976]: I0906 01:50:46.557042 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-tigera-ca-bundle\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.557132 kubelet[1976]: I0906 01:50:46.557103 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-policysync\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.557267 kubelet[1976]: I0906 01:50:46.557138 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-node-certs\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.557267 kubelet[1976]: I0906 01:50:46.557242 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-cni-log-dir\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.557377 kubelet[1976]: I0906 01:50:46.557305 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ed6c4c64-3775-4024-99ce-fa4a1e7e65cd-flexvol-driver-host\") pod \"calico-node-7jpvv\" (UID: \"ed6c4c64-3775-4024-99ce-fa4a1e7e65cd\") " pod="calico-system/calico-node-7jpvv" Sep 6 01:50:46.583884 env[1201]: time="2025-09-06T01:50:46.583723281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:46.584186 env[1201]: time="2025-09-06T01:50:46.584131029Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:46.584354 env[1201]: time="2025-09-06T01:50:46.584311308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:46.584934 env[1201]: time="2025-09-06T01:50:46.584877516Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55df1bf0a42ab4c1a413cf3c8bf4f2cf94f967c88908e0ccfe8049fa1d94d056 pid=2367 runtime=io.containerd.runc.v2 Sep 6 01:50:46.624118 systemd[1]: Started cri-containerd-55df1bf0a42ab4c1a413cf3c8bf4f2cf94f967c88908e0ccfe8049fa1d94d056.scope. Sep 6 01:50:46.665046 kubelet[1976]: E0906 01:50:46.664982 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.665307 kubelet[1976]: W0906 01:50:46.665273 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.667358 kubelet[1976]: E0906 01:50:46.667321 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.670659 kubelet[1976]: E0906 01:50:46.670623 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.670817 kubelet[1976]: W0906 01:50:46.670789 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.670947 kubelet[1976]: E0906 01:50:46.670921 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.683024 kubelet[1976]: E0906 01:50:46.682911 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.683024 kubelet[1976]: W0906 01:50:46.682937 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.683024 kubelet[1976]: E0906 01:50:46.682964 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit: BPF prog-id=118 op=LOAD Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2367 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646631626630613432616234633161343133636633633862663466 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2367 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646631626630613432616234633161343133636633633862663466 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit: BPF prog-id=119 op=LOAD Sep 6 01:50:46.692000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000296fa0 items=0 ppid=2367 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646631626630613432616234633161343133636633633862663466 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.692000 audit: BPF prog-id=120 op=LOAD Sep 6 01:50:46.692000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296fe8 items=0 ppid=2367 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646631626630613432616234633161343133636633633862663466 Sep 6 01:50:46.693000 audit: BPF prog-id=120 op=UNLOAD Sep 6 01:50:46.693000 audit: BPF prog-id=119 op=UNLOAD Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:46.693000 audit: BPF prog-id=121 op=LOAD Sep 6 01:50:46.693000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002973f8 items=0 ppid=2367 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:46.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646631626630613432616234633161343133636633633862663466 Sep 6 01:50:46.747128 env[1201]: time="2025-09-06T01:50:46.747057664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8558694659-p9msw,Uid:f7d87aec-a602-42cf-a53c-f35e569d1420,Namespace:calico-system,Attempt:0,} returns sandbox id \"55df1bf0a42ab4c1a413cf3c8bf4f2cf94f967c88908e0ccfe8049fa1d94d056\"" Sep 6 01:50:46.751508 env[1201]: time="2025-09-06T01:50:46.750735075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 6 01:50:46.842048 env[1201]: time="2025-09-06T01:50:46.841904608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7jpvv,Uid:ed6c4c64-3775-4024-99ce-fa4a1e7e65cd,Namespace:calico-system,Attempt:0,}" Sep 6 01:50:46.868574 env[1201]: time="2025-09-06T01:50:46.867350943Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:50:46.868574 env[1201]: time="2025-09-06T01:50:46.867422672Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:50:46.868574 env[1201]: time="2025-09-06T01:50:46.867439923Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:50:46.868574 env[1201]: time="2025-09-06T01:50:46.867700940Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df pid=2415 runtime=io.containerd.runc.v2 Sep 6 01:50:46.889696 systemd[1]: Started cri-containerd-47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df.scope. Sep 6 01:50:46.918388 kubelet[1976]: E0906 01:50:46.917981 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:46.921048 kubelet[1976]: I0906 01:50:46.920999 1976 status_manager.go:890] "Failed to get status for pod" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" pod="calico-system/csi-node-driver-hx2m2" err="pods \"csi-node-driver-hx2m2\" is forbidden: User \"system:node:srv-lvab0.gb1.brightbox.com\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-lvab0.gb1.brightbox.com' and this object" Sep 6 01:50:46.936835 kubelet[1976]: E0906 01:50:46.936630 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.936835 kubelet[1976]: W0906 01:50:46.936678 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.936835 kubelet[1976]: E0906 01:50:46.936707 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.937353 kubelet[1976]: E0906 01:50:46.937198 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.937353 kubelet[1976]: W0906 01:50:46.937216 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.937353 kubelet[1976]: E0906 01:50:46.937235 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.937891 kubelet[1976]: E0906 01:50:46.937630 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.937891 kubelet[1976]: W0906 01:50:46.937659 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.937891 kubelet[1976]: E0906 01:50:46.937677 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.938323 kubelet[1976]: E0906 01:50:46.938136 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.938323 kubelet[1976]: W0906 01:50:46.938154 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.938323 kubelet[1976]: E0906 01:50:46.938173 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.938774 kubelet[1976]: E0906 01:50:46.938614 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.938774 kubelet[1976]: W0906 01:50:46.938633 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.938774 kubelet[1976]: E0906 01:50:46.938661 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.939200 kubelet[1976]: E0906 01:50:46.939024 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.939200 kubelet[1976]: W0906 01:50:46.939054 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.939200 kubelet[1976]: E0906 01:50:46.939070 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.939631 kubelet[1976]: E0906 01:50:46.939454 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.939631 kubelet[1976]: W0906 01:50:46.939496 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.939631 kubelet[1976]: E0906 01:50:46.939515 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.940045 kubelet[1976]: E0906 01:50:46.939882 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.940045 kubelet[1976]: W0906 01:50:46.939900 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.940045 kubelet[1976]: E0906 01:50:46.939915 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.940462 kubelet[1976]: E0906 01:50:46.940304 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.940462 kubelet[1976]: W0906 01:50:46.940322 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.940462 kubelet[1976]: E0906 01:50:46.940337 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.940903 kubelet[1976]: E0906 01:50:46.940747 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.940903 kubelet[1976]: W0906 01:50:46.940765 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.940903 kubelet[1976]: E0906 01:50:46.940781 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.943503 kubelet[1976]: E0906 01:50:46.941181 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.943503 kubelet[1976]: W0906 01:50:46.941199 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.943503 kubelet[1976]: E0906 01:50:46.941214 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.943954 kubelet[1976]: E0906 01:50:46.941480 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.943954 kubelet[1976]: W0906 01:50:46.943791 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.943954 kubelet[1976]: E0906 01:50:46.943811 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.944710 kubelet[1976]: E0906 01:50:46.944227 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.944710 kubelet[1976]: W0906 01:50:46.944245 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.944710 kubelet[1976]: E0906 01:50:46.944262 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.944710 kubelet[1976]: E0906 01:50:46.944571 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.944710 kubelet[1976]: W0906 01:50:46.944585 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.944710 kubelet[1976]: E0906 01:50:46.944600 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.945216 kubelet[1976]: E0906 01:50:46.945196 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.945342 kubelet[1976]: W0906 01:50:46.945318 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.947498 kubelet[1976]: E0906 01:50:46.945434 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.947895 kubelet[1976]: E0906 01:50:46.947872 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.948021 kubelet[1976]: W0906 01:50:46.947997 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.948161 kubelet[1976]: E0906 01:50:46.948137 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.948603 kubelet[1976]: E0906 01:50:46.948582 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.948740 kubelet[1976]: W0906 01:50:46.948716 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.948857 kubelet[1976]: E0906 01:50:46.948833 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.949188 kubelet[1976]: E0906 01:50:46.949168 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.949297 kubelet[1976]: W0906 01:50:46.949274 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.949435 kubelet[1976]: E0906 01:50:46.949411 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.951578 kubelet[1976]: E0906 01:50:46.951556 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.951714 kubelet[1976]: W0906 01:50:46.951690 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.951835 kubelet[1976]: E0906 01:50:46.951808 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.952228 kubelet[1976]: E0906 01:50:46.952208 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.952347 kubelet[1976]: W0906 01:50:46.952324 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.952506 kubelet[1976]: E0906 01:50:46.952451 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.960386 kubelet[1976]: E0906 01:50:46.960353 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.960616 kubelet[1976]: W0906 01:50:46.960589 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.960776 kubelet[1976]: E0906 01:50:46.960749 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.960908 kubelet[1976]: I0906 01:50:46.960883 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/68bbc274-4386-44c8-80ff-be25dc03e0e0-socket-dir\") pod \"csi-node-driver-hx2m2\" (UID: \"68bbc274-4386-44c8-80ff-be25dc03e0e0\") " pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:50:46.961357 kubelet[1976]: E0906 01:50:46.961334 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.961517 kubelet[1976]: W0906 01:50:46.961491 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.961659 kubelet[1976]: E0906 01:50:46.961625 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.961886 kubelet[1976]: I0906 01:50:46.961863 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/68bbc274-4386-44c8-80ff-be25dc03e0e0-kubelet-dir\") pod \"csi-node-driver-hx2m2\" (UID: \"68bbc274-4386-44c8-80ff-be25dc03e0e0\") " pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:50:46.962179 kubelet[1976]: E0906 01:50:46.962157 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.962298 kubelet[1976]: W0906 01:50:46.962273 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.962414 kubelet[1976]: E0906 01:50:46.962391 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.962843 kubelet[1976]: E0906 01:50:46.962820 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.962962 kubelet[1976]: W0906 01:50:46.962938 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.963084 kubelet[1976]: E0906 01:50:46.963061 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.963320 kubelet[1976]: I0906 01:50:46.963296 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z84n7\" (UniqueName: \"kubernetes.io/projected/68bbc274-4386-44c8-80ff-be25dc03e0e0-kube-api-access-z84n7\") pod \"csi-node-driver-hx2m2\" (UID: \"68bbc274-4386-44c8-80ff-be25dc03e0e0\") " pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:50:46.963595 kubelet[1976]: E0906 01:50:46.963575 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.963745 kubelet[1976]: W0906 01:50:46.963721 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.963866 kubelet[1976]: E0906 01:50:46.963843 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.964210 kubelet[1976]: E0906 01:50:46.964189 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.964341 kubelet[1976]: W0906 01:50:46.964317 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.966557 kubelet[1976]: E0906 01:50:46.965566 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.966557 kubelet[1976]: E0906 01:50:46.965869 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.966557 kubelet[1976]: W0906 01:50:46.965884 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.966557 kubelet[1976]: E0906 01:50:46.965900 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.968575 kubelet[1976]: E0906 01:50:46.968549 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.968575 kubelet[1976]: W0906 01:50:46.968572 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.968757 kubelet[1976]: E0906 01:50:46.968590 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.968886 kubelet[1976]: E0906 01:50:46.968861 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.968886 kubelet[1976]: W0906 01:50:46.968882 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.969054 kubelet[1976]: E0906 01:50:46.968897 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.971575 kubelet[1976]: E0906 01:50:46.971549 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.971575 kubelet[1976]: W0906 01:50:46.971571 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.971758 kubelet[1976]: E0906 01:50:46.971588 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.971758 kubelet[1976]: I0906 01:50:46.971626 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/68bbc274-4386-44c8-80ff-be25dc03e0e0-registration-dir\") pod \"csi-node-driver-hx2m2\" (UID: \"68bbc274-4386-44c8-80ff-be25dc03e0e0\") " pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:50:46.971930 kubelet[1976]: E0906 01:50:46.971905 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.971930 kubelet[1976]: W0906 01:50:46.971927 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.972075 kubelet[1976]: E0906 01:50:46.971943 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.972075 kubelet[1976]: I0906 01:50:46.971965 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/68bbc274-4386-44c8-80ff-be25dc03e0e0-varrun\") pod \"csi-node-driver-hx2m2\" (UID: \"68bbc274-4386-44c8-80ff-be25dc03e0e0\") " pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:50:46.972582 kubelet[1976]: E0906 01:50:46.972558 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.972582 kubelet[1976]: W0906 01:50:46.972579 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.972757 kubelet[1976]: E0906 01:50:46.972603 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.972875 kubelet[1976]: E0906 01:50:46.972851 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.972875 kubelet[1976]: W0906 01:50:46.972871 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.973008 kubelet[1976]: E0906 01:50:46.972893 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.974905 kubelet[1976]: E0906 01:50:46.974878 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.974905 kubelet[1976]: W0906 01:50:46.974901 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.975109 kubelet[1976]: E0906 01:50:46.974918 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:46.975198 kubelet[1976]: E0906 01:50:46.975174 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:46.975198 kubelet[1976]: W0906 01:50:46.975195 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:46.975307 kubelet[1976]: E0906 01:50:46.975213 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026870 kernel: kauditd_printk_skb: 76 callbacks suppressed Sep 6 01:50:47.027114 kernel: audit: type=1400 audit(1757123447.021:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.036792 kernel: audit: type=1400 audit(1757123447.021:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.040370 kernel: audit: type=1400 audit(1757123447.021:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.050112 kernel: audit: type=1400 audit(1757123447.021:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.053768 kernel: audit: type=1400 audit(1757123447.021:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.059971 kernel: audit: type=1400 audit(1757123447.021:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.060060 kernel: audit: type=1400 audit(1757123447.021:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.080094 kernel: audit: type=1400 audit(1757123447.021:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.080201 kernel: audit: type=1400 audit(1757123447.021:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.080846 kubelet[1976]: E0906 01:50:47.080441 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.080846 kubelet[1976]: W0906 01:50:47.080496 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.080846 kubelet[1976]: E0906 01:50:47.080526 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.084995 kernel: audit: type=1400 audit(1757123447.021:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.085211 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.086607 kubelet[1976]: W0906 01:50:47.085235 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.085263 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.085718 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.086607 kubelet[1976]: W0906 01:50:47.085733 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.085861 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.086088 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.086607 kubelet[1976]: W0906 01:50:47.086103 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.086234 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.086607 kubelet[1976]: E0906 01:50:47.086433 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.087149 kubelet[1976]: W0906 01:50:47.086447 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.087149 kubelet[1976]: E0906 01:50:47.086492 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.087621 kubelet[1976]: E0906 01:50:47.087464 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.087621 kubelet[1976]: W0906 01:50:47.087514 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.087914 kubelet[1976]: E0906 01:50:47.087789 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.088100 kubelet[1976]: E0906 01:50:47.088080 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.088232 kubelet[1976]: W0906 01:50:47.088208 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.088562 kubelet[1976]: E0906 01:50:47.088540 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.088879 kubelet[1976]: E0906 01:50:47.088859 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.088990 kubelet[1976]: W0906 01:50:47.088967 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.089245 kubelet[1976]: E0906 01:50:47.089220 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.021000 audit: BPF prog-id=122 op=LOAD Sep 6 01:50:47.025000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.025000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2415 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663163623061623064663931653035333465336631343135623461 Sep 6 01:50:47.025000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.025000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2415 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663163623061623064663931653035333465336631343135623461 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit: BPF prog-id=123 op=LOAD Sep 6 01:50:47.026000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185fa0 items=0 ppid=2415 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663163623061623064663931653035333465336631343135623461 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.026000 audit: BPF prog-id=124 op=LOAD Sep 6 01:50:47.026000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185fe8 items=0 ppid=2415 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663163623061623064663931653035333465336631343135623461 Sep 6 01:50:47.041000 audit: BPF prog-id=124 op=UNLOAD Sep 6 01:50:47.041000 audit: BPF prog-id=123 op=UNLOAD Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:47.041000 audit: BPF prog-id=125 op=LOAD Sep 6 01:50:47.041000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bc3f8 items=0 ppid=2415 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663163623061623064663931653035333465336631343135623461 Sep 6 01:50:47.101466 kubelet[1976]: E0906 01:50:47.094620 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.101466 kubelet[1976]: W0906 01:50:47.094654 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.101466 kubelet[1976]: E0906 01:50:47.095059 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.101466 kubelet[1976]: W0906 01:50:47.095075 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.104076 kubelet[1976]: E0906 01:50:47.103546 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.104076 kubelet[1976]: E0906 01:50:47.103594 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.104076 kubelet[1976]: E0906 01:50:47.104064 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.104232 kubelet[1976]: W0906 01:50:47.104084 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.104452 kubelet[1976]: E0906 01:50:47.104319 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.104452 kubelet[1976]: E0906 01:50:47.104367 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.104452 kubelet[1976]: W0906 01:50:47.104381 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.104452 kubelet[1976]: E0906 01:50:47.104414 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.104755 kubelet[1976]: E0906 01:50:47.104686 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.104755 kubelet[1976]: W0906 01:50:47.104701 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.105075 kubelet[1976]: E0906 01:50:47.104909 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.106669 kubelet[1976]: E0906 01:50:47.105988 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.106669 kubelet[1976]: W0906 01:50:47.106009 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.106669 kubelet[1976]: E0906 01:50:47.106362 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.106669 kubelet[1976]: W0906 01:50:47.106376 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.106669 kubelet[1976]: E0906 01:50:47.106509 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.106669 kubelet[1976]: E0906 01:50:47.106594 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.106669 kubelet[1976]: E0906 01:50:47.106654 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.106669 kubelet[1976]: W0906 01:50:47.106671 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.107341 kubelet[1976]: E0906 01:50:47.107153 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.108963 kubelet[1976]: E0906 01:50:47.107501 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.108963 kubelet[1976]: W0906 01:50:47.107522 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.108963 kubelet[1976]: E0906 01:50:47.107833 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.108963 kubelet[1976]: W0906 01:50:47.107867 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.108963 kubelet[1976]: E0906 01:50:47.108174 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.108963 kubelet[1976]: W0906 01:50:47.108188 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.108963 kubelet[1976]: E0906 01:50:47.108426 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.108963 kubelet[1976]: E0906 01:50:47.108445 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.108963 kubelet[1976]: E0906 01:50:47.108435 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.108963 kubelet[1976]: W0906 01:50:47.108451 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.109444 kubelet[1976]: E0906 01:50:47.108529 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.109444 kubelet[1976]: E0906 01:50:47.108792 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.109444 kubelet[1976]: W0906 01:50:47.108807 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.109444 kubelet[1976]: E0906 01:50:47.108823 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.112160 kubelet[1976]: E0906 01:50:47.108425 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.112160 kubelet[1976]: E0906 01:50:47.111841 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.112160 kubelet[1976]: W0906 01:50:47.111869 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.112614 kubelet[1976]: E0906 01:50:47.112365 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.112614 kubelet[1976]: W0906 01:50:47.112390 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.112614 kubelet[1976]: E0906 01:50:47.112407 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.116995 kubelet[1976]: E0906 01:50:47.116565 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.116995 kubelet[1976]: W0906 01:50:47.116591 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.116995 kubelet[1976]: E0906 01:50:47.116612 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.116995 kubelet[1976]: E0906 01:50:47.116663 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.123679 kubelet[1976]: E0906 01:50:47.123620 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.123679 kubelet[1976]: W0906 01:50:47.123661 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.123919 kubelet[1976]: E0906 01:50:47.123699 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.149452 kubelet[1976]: E0906 01:50:47.149406 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:47.149452 kubelet[1976]: W0906 01:50:47.149437 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:47.149699 kubelet[1976]: E0906 01:50:47.149464 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:47.185908 env[1201]: time="2025-09-06T01:50:47.185832044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7jpvv,Uid:ed6c4c64-3775-4024-99ce-fa4a1e7e65cd,Namespace:calico-system,Attempt:0,} returns sandbox id \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\"" Sep 6 01:50:47.202000 audit[2510]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:47.202000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffcb10e0e70 a2=0 a3=7ffcb10e0e5c items=0 ppid=2097 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:47.209000 audit[2510]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:50:47.209000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb10e0e70 a2=0 a3=0 items=0 ppid=2097 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:47.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:50:48.359613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2082602759.mount: Deactivated successfully. Sep 6 01:50:48.805591 kubelet[1976]: E0906 01:50:48.804795 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:50.210501 env[1201]: time="2025-09-06T01:50:50.210418070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:50.213017 env[1201]: time="2025-09-06T01:50:50.212978332Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:50.214732 env[1201]: time="2025-09-06T01:50:50.214696390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:50.217250 env[1201]: time="2025-09-06T01:50:50.217214434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:50.217680 env[1201]: time="2025-09-06T01:50:50.217635171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 6 01:50:50.220779 env[1201]: time="2025-09-06T01:50:50.220743922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 6 01:50:50.247978 env[1201]: time="2025-09-06T01:50:50.247929097Z" level=info msg="CreateContainer within sandbox \"55df1bf0a42ab4c1a413cf3c8bf4f2cf94f967c88908e0ccfe8049fa1d94d056\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 6 01:50:50.265592 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3198219442.mount: Deactivated successfully. Sep 6 01:50:50.270158 env[1201]: time="2025-09-06T01:50:50.270112629Z" level=info msg="CreateContainer within sandbox \"55df1bf0a42ab4c1a413cf3c8bf4f2cf94f967c88908e0ccfe8049fa1d94d056\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6424a1cf95ba5485f36a17afd9d0bdc9655a030f4173dad1cd74c6dbbe01d2f9\"" Sep 6 01:50:50.273153 env[1201]: time="2025-09-06T01:50:50.273110827Z" level=info msg="StartContainer for \"6424a1cf95ba5485f36a17afd9d0bdc9655a030f4173dad1cd74c6dbbe01d2f9\"" Sep 6 01:50:50.305698 systemd[1]: Started cri-containerd-6424a1cf95ba5485f36a17afd9d0bdc9655a030f4173dad1cd74c6dbbe01d2f9.scope. Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.351000 audit: BPF prog-id=126 op=LOAD Sep 6 01:50:50.353000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.353000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2367 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:50.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323461316366393562613534383566333661313761666439643062 Sep 6 01:50:50.353000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.353000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2367 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:50.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323461316366393562613534383566333661313761666439643062 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.354000 audit: BPF prog-id=127 op=LOAD Sep 6 01:50:50.354000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024ca0 items=0 ppid=2367 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:50.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323461316366393562613534383566333661313761666439643062 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.355000 audit: BPF prog-id=128 op=LOAD Sep 6 01:50:50.355000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024ce8 items=0 ppid=2367 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:50.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323461316366393562613534383566333661313761666439643062 Sep 6 01:50:50.356000 audit: BPF prog-id=128 op=UNLOAD Sep 6 01:50:50.356000 audit: BPF prog-id=127 op=UNLOAD Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:50.356000 audit: BPF prog-id=129 op=LOAD Sep 6 01:50:50.356000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000250f8 items=0 ppid=2367 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:50.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323461316366393562613534383566333661313761666439643062 Sep 6 01:50:50.435433 env[1201]: time="2025-09-06T01:50:50.435372704Z" level=info msg="StartContainer for \"6424a1cf95ba5485f36a17afd9d0bdc9655a030f4173dad1cd74c6dbbe01d2f9\" returns successfully" Sep 6 01:50:50.804642 kubelet[1976]: E0906 01:50:50.804565 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:50.959985 kubelet[1976]: I0906 01:50:50.959902 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8558694659-p9msw" podStartSLOduration=1.49073757 podStartE2EDuration="4.959864679s" podCreationTimestamp="2025-09-06 01:50:46 +0000 UTC" firstStartedPulling="2025-09-06 01:50:46.750205055 +0000 UTC m=+21.172824829" lastFinishedPulling="2025-09-06 01:50:50.219332156 +0000 UTC m=+24.641951938" observedRunningTime="2025-09-06 01:50:50.958938164 +0000 UTC m=+25.381557947" watchObservedRunningTime="2025-09-06 01:50:50.959864679 +0000 UTC m=+25.382484453" Sep 6 01:50:50.983639 kubelet[1976]: E0906 01:50:50.983570 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.983917 kubelet[1976]: W0906 01:50:50.983887 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.984069 kubelet[1976]: E0906 01:50:50.984041 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.984536 kubelet[1976]: E0906 01:50:50.984515 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.984699 kubelet[1976]: W0906 01:50:50.984674 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.984846 kubelet[1976]: E0906 01:50:50.984821 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.985294 kubelet[1976]: E0906 01:50:50.985256 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.985438 kubelet[1976]: W0906 01:50:50.985414 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.985604 kubelet[1976]: E0906 01:50:50.985568 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.986276 kubelet[1976]: E0906 01:50:50.986255 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.986428 kubelet[1976]: W0906 01:50:50.986403 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.986609 kubelet[1976]: E0906 01:50:50.986573 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.987120 kubelet[1976]: E0906 01:50:50.987090 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.987264 kubelet[1976]: W0906 01:50:50.987239 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.987419 kubelet[1976]: E0906 01:50:50.987395 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.987899 kubelet[1976]: E0906 01:50:50.987869 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.988041 kubelet[1976]: W0906 01:50:50.988017 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.988202 kubelet[1976]: E0906 01:50:50.988178 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.988592 kubelet[1976]: E0906 01:50:50.988571 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.988786 kubelet[1976]: W0906 01:50:50.988761 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.988908 kubelet[1976]: E0906 01:50:50.988884 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.989257 kubelet[1976]: E0906 01:50:50.989235 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.989379 kubelet[1976]: W0906 01:50:50.989355 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.989532 kubelet[1976]: E0906 01:50:50.989507 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.989902 kubelet[1976]: E0906 01:50:50.989881 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.990031 kubelet[1976]: W0906 01:50:50.990007 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.990172 kubelet[1976]: E0906 01:50:50.990147 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.990608 kubelet[1976]: E0906 01:50:50.990575 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.990740 kubelet[1976]: W0906 01:50:50.990716 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.990859 kubelet[1976]: E0906 01:50:50.990835 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.991298 kubelet[1976]: E0906 01:50:50.991277 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.991429 kubelet[1976]: W0906 01:50:50.991405 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.991622 kubelet[1976]: E0906 01:50:50.991571 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.992001 kubelet[1976]: E0906 01:50:50.991981 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.992131 kubelet[1976]: W0906 01:50:50.992107 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.992250 kubelet[1976]: E0906 01:50:50.992226 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.992657 kubelet[1976]: E0906 01:50:50.992636 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.992779 kubelet[1976]: W0906 01:50:50.992754 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.992911 kubelet[1976]: E0906 01:50:50.992887 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.993353 kubelet[1976]: E0906 01:50:50.993332 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.993501 kubelet[1976]: W0906 01:50:50.993445 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.993660 kubelet[1976]: E0906 01:50:50.993633 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:50.994117 kubelet[1976]: E0906 01:50:50.994097 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:50.994227 kubelet[1976]: W0906 01:50:50.994202 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:50.994358 kubelet[1976]: E0906 01:50:50.994333 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.040156 kubelet[1976]: E0906 01:50:51.040116 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.040450 kubelet[1976]: W0906 01:50:51.040407 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.040638 kubelet[1976]: E0906 01:50:51.040608 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.041425 kubelet[1976]: E0906 01:50:51.041390 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.041572 kubelet[1976]: W0906 01:50:51.041546 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.041720 kubelet[1976]: E0906 01:50:51.041694 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.042002 kubelet[1976]: E0906 01:50:51.041976 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.042002 kubelet[1976]: W0906 01:50:51.042000 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.042126 kubelet[1976]: E0906 01:50:51.042028 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.042322 kubelet[1976]: E0906 01:50:51.042297 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.042322 kubelet[1976]: W0906 01:50:51.042317 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.042486 kubelet[1976]: E0906 01:50:51.042341 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.042646 kubelet[1976]: E0906 01:50:51.042621 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.042646 kubelet[1976]: W0906 01:50:51.042641 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.042844 kubelet[1976]: E0906 01:50:51.042664 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.043000 kubelet[1976]: E0906 01:50:51.042964 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.043000 kubelet[1976]: W0906 01:50:51.042994 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.043121 kubelet[1976]: E0906 01:50:51.043094 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.043712 kubelet[1976]: E0906 01:50:51.043678 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.043712 kubelet[1976]: W0906 01:50:51.043702 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.043914 kubelet[1976]: E0906 01:50:51.043888 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.044045 kubelet[1976]: E0906 01:50:51.043943 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.044129 kubelet[1976]: W0906 01:50:51.044051 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.044280 kubelet[1976]: E0906 01:50:51.044255 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.044413 kubelet[1976]: E0906 01:50:51.044315 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.044561 kubelet[1976]: W0906 01:50:51.044535 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.044716 kubelet[1976]: E0906 01:50:51.044688 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.045015 kubelet[1976]: E0906 01:50:51.044982 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.045015 kubelet[1976]: W0906 01:50:51.045005 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.045164 kubelet[1976]: E0906 01:50:51.045041 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.045306 kubelet[1976]: E0906 01:50:51.045285 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.045306 kubelet[1976]: W0906 01:50:51.045304 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.045436 kubelet[1976]: E0906 01:50:51.045328 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.045661 kubelet[1976]: E0906 01:50:51.045639 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.045661 kubelet[1976]: W0906 01:50:51.045658 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.045785 kubelet[1976]: E0906 01:50:51.045767 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.045950 kubelet[1976]: E0906 01:50:51.045930 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.045950 kubelet[1976]: W0906 01:50:51.045950 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.045972 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.046214 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.052423 kubelet[1976]: W0906 01:50:51.046227 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.046251 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.046571 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.052423 kubelet[1976]: W0906 01:50:51.046585 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.046621 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.047450 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.052423 kubelet[1976]: W0906 01:50:51.047516 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.052423 kubelet[1976]: E0906 01:50:51.047554 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.052972 kubelet[1976]: E0906 01:50:51.047911 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.052972 kubelet[1976]: W0906 01:50:51.047928 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.052972 kubelet[1976]: E0906 01:50:51.047945 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.052972 kubelet[1976]: E0906 01:50:51.048522 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:51.052972 kubelet[1976]: W0906 01:50:51.048538 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:51.052972 kubelet[1976]: E0906 01:50:51.048554 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:51.843176 env[1201]: time="2025-09-06T01:50:51.843121929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:51.846461 env[1201]: time="2025-09-06T01:50:51.846425020Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:51.849370 env[1201]: time="2025-09-06T01:50:51.849314630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:51.854821 env[1201]: time="2025-09-06T01:50:51.852340823Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:51.854821 env[1201]: time="2025-09-06T01:50:51.853424207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 6 01:50:51.859830 env[1201]: time="2025-09-06T01:50:51.859779974Z" level=info msg="CreateContainer within sandbox \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 6 01:50:51.880350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2096611293.mount: Deactivated successfully. Sep 6 01:50:51.898110 env[1201]: time="2025-09-06T01:50:51.898052473Z" level=info msg="CreateContainer within sandbox \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee\"" Sep 6 01:50:51.899407 env[1201]: time="2025-09-06T01:50:51.899368167Z" level=info msg="StartContainer for \"94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee\"" Sep 6 01:50:51.937395 systemd[1]: Started cri-containerd-94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee.scope. Sep 6 01:50:51.959419 kubelet[1976]: I0906 01:50:51.959367 1976 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:50:52.004575 kubelet[1976]: E0906 01:50:52.004537 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.004575 kubelet[1976]: W0906 01:50:52.004569 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.004836 kubelet[1976]: E0906 01:50:52.004611 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.004933 kubelet[1976]: E0906 01:50:52.004907 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.004933 kubelet[1976]: W0906 01:50:52.004928 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.005068 kubelet[1976]: E0906 01:50:52.004949 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.005198 kubelet[1976]: E0906 01:50:52.005174 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.005198 kubelet[1976]: W0906 01:50:52.005195 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.005330 kubelet[1976]: E0906 01:50:52.005212 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.005462 kubelet[1976]: E0906 01:50:52.005438 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.005564 kubelet[1976]: W0906 01:50:52.005462 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.005564 kubelet[1976]: E0906 01:50:52.005518 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.005797 kubelet[1976]: E0906 01:50:52.005773 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.005797 kubelet[1976]: W0906 01:50:52.005794 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.005945 kubelet[1976]: E0906 01:50:52.005810 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.006050 kubelet[1976]: E0906 01:50:52.006027 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.006050 kubelet[1976]: W0906 01:50:52.006047 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.006179 kubelet[1976]: E0906 01:50:52.006063 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.006302 kubelet[1976]: E0906 01:50:52.006279 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.006302 kubelet[1976]: W0906 01:50:52.006299 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.006435 kubelet[1976]: E0906 01:50:52.006314 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.006606 kubelet[1976]: E0906 01:50:52.006553 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.006606 kubelet[1976]: W0906 01:50:52.006572 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.006606 kubelet[1976]: E0906 01:50:52.006599 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.006849 kubelet[1976]: E0906 01:50:52.006826 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.006849 kubelet[1976]: W0906 01:50:52.006846 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.006973 kubelet[1976]: E0906 01:50:52.006862 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.007137 kubelet[1976]: E0906 01:50:52.007099 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.007137 kubelet[1976]: W0906 01:50:52.007119 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.007137 kubelet[1976]: E0906 01:50:52.007134 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.007411 kubelet[1976]: E0906 01:50:52.007381 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.007411 kubelet[1976]: W0906 01:50:52.007407 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.007411 kubelet[1976]: E0906 01:50:52.007423 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.007820 kubelet[1976]: E0906 01:50:52.007737 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.007820 kubelet[1976]: W0906 01:50:52.007757 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.007820 kubelet[1976]: E0906 01:50:52.007772 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.008034 kubelet[1976]: E0906 01:50:52.008012 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.008034 kubelet[1976]: W0906 01:50:52.008025 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.008130 kubelet[1976]: E0906 01:50:52.008039 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.008298 kubelet[1976]: E0906 01:50:52.008255 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.008298 kubelet[1976]: W0906 01:50:52.008275 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.008298 kubelet[1976]: E0906 01:50:52.008290 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.008620 kubelet[1976]: E0906 01:50:52.008576 1976 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 6 01:50:52.008620 kubelet[1976]: W0906 01:50:52.008609 1976 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 6 01:50:52.008791 kubelet[1976]: E0906 01:50:52.008625 1976 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 6 01:50:52.011000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.011000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fe7001fa2f8 items=0 ppid=2415 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:52.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636337333362323464366134653739333261633234366131623537 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.012000 audit: BPF prog-id=130 op=LOAD Sep 6 01:50:52.012000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0000246d8 items=0 ppid=2415 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:52.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636337333362323464366134653739333261633234366131623537 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit: BPF prog-id=131 op=LOAD Sep 6 01:50:52.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024728 items=0 ppid=2415 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:52.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636337333362323464366134653739333261633234366131623537 Sep 6 01:50:52.013000 audit: BPF prog-id=131 op=UNLOAD Sep 6 01:50:52.013000 audit: BPF prog-id=130 op=UNLOAD Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:52.013000 audit: BPF prog-id=132 op=LOAD Sep 6 01:50:52.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0000247b8 items=0 ppid=2415 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:52.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636337333362323464366134653739333261633234366131623537 Sep 6 01:50:52.039188 env[1201]: time="2025-09-06T01:50:52.039133291Z" level=info msg="StartContainer for \"94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee\" returns successfully" Sep 6 01:50:52.054989 systemd[1]: cri-containerd-94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee.scope: Deactivated successfully. Sep 6 01:50:52.066649 kernel: kauditd_printk_skb: 153 callbacks suppressed Sep 6 01:50:52.067037 kernel: audit: type=1334 audit(1757123452.058:988): prog-id=132 op=UNLOAD Sep 6 01:50:52.058000 audit: BPF prog-id=132 op=UNLOAD Sep 6 01:50:52.231441 systemd[1]: run-containerd-runc-k8s.io-94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee-runc.nJyMac.mount: Deactivated successfully. Sep 6 01:50:52.232851 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee-rootfs.mount: Deactivated successfully. Sep 6 01:50:52.267673 env[1201]: time="2025-09-06T01:50:52.267602270Z" level=info msg="shim disconnected" id=94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee Sep 6 01:50:52.267673 env[1201]: time="2025-09-06T01:50:52.267689552Z" level=warning msg="cleaning up after shim disconnected" id=94cc733b24d6a4e7932ac246a1b57f18a5bc586443daa4b4ea2798130a3154ee namespace=k8s.io Sep 6 01:50:52.267979 env[1201]: time="2025-09-06T01:50:52.267709087Z" level=info msg="cleaning up dead shim" Sep 6 01:50:52.280560 env[1201]: time="2025-09-06T01:50:52.280503447Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:50:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2652 runtime=io.containerd.runc.v2\n" Sep 6 01:50:52.804803 kubelet[1976]: E0906 01:50:52.804732 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:52.968506 env[1201]: time="2025-09-06T01:50:52.967105437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 6 01:50:54.807887 kubelet[1976]: E0906 01:50:54.804718 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:56.805493 kubelet[1976]: E0906 01:50:56.805156 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:58.698320 env[1201]: time="2025-09-06T01:50:58.697933813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:58.701042 env[1201]: time="2025-09-06T01:50:58.700948034Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:58.704132 env[1201]: time="2025-09-06T01:50:58.704093311Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:58.705994 env[1201]: time="2025-09-06T01:50:58.705955904Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:50:58.706816 env[1201]: time="2025-09-06T01:50:58.706777861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 6 01:50:58.712706 env[1201]: time="2025-09-06T01:50:58.712411664Z" level=info msg="CreateContainer within sandbox \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 6 01:50:58.732884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1664081686.mount: Deactivated successfully. Sep 6 01:50:58.739254 env[1201]: time="2025-09-06T01:50:58.739203666Z" level=info msg="CreateContainer within sandbox \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472\"" Sep 6 01:50:58.742411 env[1201]: time="2025-09-06T01:50:58.740388380Z" level=info msg="StartContainer for \"10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472\"" Sep 6 01:50:58.779247 systemd[1]: run-containerd-runc-k8s.io-10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472-runc.knA2U2.mount: Deactivated successfully. Sep 6 01:50:58.785583 systemd[1]: Started cri-containerd-10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472.scope. Sep 6 01:50:58.804273 kubelet[1976]: E0906 01:50:58.804219 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4ecc517588 items=0 ppid=2415 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:58.837301 kernel: audit: type=1400 audit(1757123458.819:989): avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.837533 kernel: audit: type=1300 audit(1757123458.819:989): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4ecc517588 items=0 ppid=2415 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:58.837627 kernel: audit: type=1327 audit(1757123458.819:989): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130616665366438313437303361616236383466306663303465323661 Sep 6 01:50:58.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130616665366438313437303361616236383466306663303465323661 Sep 6 01:50:58.846111 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.853432 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.855923 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.863050 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.863211 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.872726 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.882555 kernel: audit: type=1400 audit(1757123458.819:990): avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.819000 audit: BPF prog-id=133 op=LOAD Sep 6 01:50:58.819000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002bfed8 items=0 ppid=2415 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:58.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130616665366438313437303361616236383466306663303465323661 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.843000 audit: BPF prog-id=134 op=LOAD Sep 6 01:50:58.843000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002bff28 items=0 ppid=2415 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:58.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130616665366438313437303361616236383466306663303465323661 Sep 6 01:50:58.848000 audit: BPF prog-id=134 op=UNLOAD Sep 6 01:50:58.848000 audit: BPF prog-id=133 op=UNLOAD Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:50:58.848000 audit: BPF prog-id=135 op=LOAD Sep 6 01:50:58.848000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002bffb8 items=0 ppid=2415 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:50:58.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130616665366438313437303361616236383466306663303465323661 Sep 6 01:50:58.913512 env[1201]: time="2025-09-06T01:50:58.911591378Z" level=info msg="StartContainer for \"10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472\" returns successfully" Sep 6 01:51:00.075903 env[1201]: time="2025-09-06T01:51:00.075728023Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 6 01:51:00.079869 systemd[1]: cri-containerd-10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472.scope: Deactivated successfully. Sep 6 01:51:00.083000 audit: BPF prog-id=135 op=UNLOAD Sep 6 01:51:00.111078 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472-rootfs.mount: Deactivated successfully. Sep 6 01:51:00.117231 env[1201]: time="2025-09-06T01:51:00.117011237Z" level=info msg="shim disconnected" id=10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472 Sep 6 01:51:00.117231 env[1201]: time="2025-09-06T01:51:00.117088268Z" level=warning msg="cleaning up after shim disconnected" id=10afe6d814703aab684f0fc04e26a08f5a3eb30f396cfd8bcb55e6e8e57ad472 namespace=k8s.io Sep 6 01:51:00.117231 env[1201]: time="2025-09-06T01:51:00.117115640Z" level=info msg="cleaning up dead shim" Sep 6 01:51:00.129693 env[1201]: time="2025-09-06T01:51:00.129556302Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:51:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2717 runtime=io.containerd.runc.v2\n" Sep 6 01:51:00.147211 kubelet[1976]: I0906 01:51:00.147168 1976 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 6 01:51:00.220287 systemd[1]: Created slice kubepods-burstable-poda1e32e33_a785_4580_ae5b_d0382082341d.slice. Sep 6 01:51:00.225378 systemd[1]: Created slice kubepods-besteffort-pod79b17d51_205b_45ba_9310_076cced172a7.slice. Sep 6 01:51:00.240377 systemd[1]: Created slice kubepods-besteffort-podf8303c83_3056_43e0_b522_817a0f1904bf.slice. Sep 6 01:51:00.253159 systemd[1]: Created slice kubepods-burstable-pod00b78940_5f73_4204_96b1_330a29fc1d16.slice. Sep 6 01:51:00.267098 systemd[1]: Created slice kubepods-besteffort-pod04532c76_6801_4489_bbb9_c2be04557e1b.slice. Sep 6 01:51:00.276085 systemd[1]: Created slice kubepods-besteffort-pod7a0bb70b_816e_46fb_960c_13508504a78b.slice. Sep 6 01:51:00.290160 systemd[1]: Created slice kubepods-besteffort-pod87323d63_715c_4f88_bbb8_886336ab6529.slice. Sep 6 01:51:00.341087 kubelet[1976]: I0906 01:51:00.340930 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcgp4\" (UniqueName: \"kubernetes.io/projected/79b17d51-205b-45ba-9310-076cced172a7-kube-api-access-zcgp4\") pod \"goldmane-54d579b49d-6ngzs\" (UID: \"79b17d51-205b-45ba-9310-076cced172a7\") " pod="calico-system/goldmane-54d579b49d-6ngzs" Sep 6 01:51:00.341401 kubelet[1976]: I0906 01:51:00.341352 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/04532c76-6801-4489-bbb9-c2be04557e1b-calico-apiserver-certs\") pod \"calico-apiserver-7dc7b8776b-m7mdj\" (UID: \"04532c76-6801-4489-bbb9-c2be04557e1b\") " pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" Sep 6 01:51:00.341619 kubelet[1976]: I0906 01:51:00.341591 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-567bm\" (UniqueName: \"kubernetes.io/projected/a1e32e33-a785-4580-ae5b-d0382082341d-kube-api-access-567bm\") pod \"coredns-668d6bf9bc-42nvm\" (UID: \"a1e32e33-a785-4580-ae5b-d0382082341d\") " pod="kube-system/coredns-668d6bf9bc-42nvm" Sep 6 01:51:00.341860 kubelet[1976]: I0906 01:51:00.341817 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f8303c83-3056-43e0-b522-817a0f1904bf-calico-apiserver-certs\") pod \"calico-apiserver-7dc7b8776b-4749k\" (UID: \"f8303c83-3056-43e0-b522-817a0f1904bf\") " pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" Sep 6 01:51:00.342072 kubelet[1976]: I0906 01:51:00.342046 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/79b17d51-205b-45ba-9310-076cced172a7-goldmane-key-pair\") pod \"goldmane-54d579b49d-6ngzs\" (UID: \"79b17d51-205b-45ba-9310-076cced172a7\") " pod="calico-system/goldmane-54d579b49d-6ngzs" Sep 6 01:51:00.342306 kubelet[1976]: I0906 01:51:00.342261 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a1e32e33-a785-4580-ae5b-d0382082341d-config-volume\") pod \"coredns-668d6bf9bc-42nvm\" (UID: \"a1e32e33-a785-4580-ae5b-d0382082341d\") " pod="kube-system/coredns-668d6bf9bc-42nvm" Sep 6 01:51:00.342524 kubelet[1976]: I0906 01:51:00.342497 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w5vfp\" (UniqueName: \"kubernetes.io/projected/f8303c83-3056-43e0-b522-817a0f1904bf-kube-api-access-w5vfp\") pod \"calico-apiserver-7dc7b8776b-4749k\" (UID: \"f8303c83-3056-43e0-b522-817a0f1904bf\") " pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" Sep 6 01:51:00.342734 kubelet[1976]: I0906 01:51:00.342706 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87323d63-715c-4f88-bbb8-886336ab6529-whisker-ca-bundle\") pod \"whisker-6c65c9557f-zhn44\" (UID: \"87323d63-715c-4f88-bbb8-886336ab6529\") " pod="calico-system/whisker-6c65c9557f-zhn44" Sep 6 01:51:00.342878 kubelet[1976]: I0906 01:51:00.342851 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7a0bb70b-816e-46fb-960c-13508504a78b-tigera-ca-bundle\") pod \"calico-kube-controllers-798f59b8c7-m4nnq\" (UID: \"7a0bb70b-816e-46fb-960c-13508504a78b\") " pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" Sep 6 01:51:00.343056 kubelet[1976]: I0906 01:51:00.343027 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/00b78940-5f73-4204-96b1-330a29fc1d16-config-volume\") pod \"coredns-668d6bf9bc-5tx9n\" (UID: \"00b78940-5f73-4204-96b1-330a29fc1d16\") " pod="kube-system/coredns-668d6bf9bc-5tx9n" Sep 6 01:51:00.343222 kubelet[1976]: I0906 01:51:00.343194 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zxs5g\" (UniqueName: \"kubernetes.io/projected/7a0bb70b-816e-46fb-960c-13508504a78b-kube-api-access-zxs5g\") pod \"calico-kube-controllers-798f59b8c7-m4nnq\" (UID: \"7a0bb70b-816e-46fb-960c-13508504a78b\") " pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" Sep 6 01:51:00.343396 kubelet[1976]: I0906 01:51:00.343367 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wqh85\" (UniqueName: \"kubernetes.io/projected/87323d63-715c-4f88-bbb8-886336ab6529-kube-api-access-wqh85\") pod \"whisker-6c65c9557f-zhn44\" (UID: \"87323d63-715c-4f88-bbb8-886336ab6529\") " pod="calico-system/whisker-6c65c9557f-zhn44" Sep 6 01:51:00.343586 kubelet[1976]: I0906 01:51:00.343560 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/79b17d51-205b-45ba-9310-076cced172a7-config\") pod \"goldmane-54d579b49d-6ngzs\" (UID: \"79b17d51-205b-45ba-9310-076cced172a7\") " pod="calico-system/goldmane-54d579b49d-6ngzs" Sep 6 01:51:00.343751 kubelet[1976]: I0906 01:51:00.343725 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/79b17d51-205b-45ba-9310-076cced172a7-goldmane-ca-bundle\") pod \"goldmane-54d579b49d-6ngzs\" (UID: \"79b17d51-205b-45ba-9310-076cced172a7\") " pod="calico-system/goldmane-54d579b49d-6ngzs" Sep 6 01:51:00.343918 kubelet[1976]: I0906 01:51:00.343891 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gwf8p\" (UniqueName: \"kubernetes.io/projected/04532c76-6801-4489-bbb9-c2be04557e1b-kube-api-access-gwf8p\") pod \"calico-apiserver-7dc7b8776b-m7mdj\" (UID: \"04532c76-6801-4489-bbb9-c2be04557e1b\") " pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" Sep 6 01:51:00.344079 kubelet[1976]: I0906 01:51:00.344052 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p77c2\" (UniqueName: \"kubernetes.io/projected/00b78940-5f73-4204-96b1-330a29fc1d16-kube-api-access-p77c2\") pod \"coredns-668d6bf9bc-5tx9n\" (UID: \"00b78940-5f73-4204-96b1-330a29fc1d16\") " pod="kube-system/coredns-668d6bf9bc-5tx9n" Sep 6 01:51:00.344242 kubelet[1976]: I0906 01:51:00.344201 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/87323d63-715c-4f88-bbb8-886336ab6529-whisker-backend-key-pair\") pod \"whisker-6c65c9557f-zhn44\" (UID: \"87323d63-715c-4f88-bbb8-886336ab6529\") " pod="calico-system/whisker-6c65c9557f-zhn44" Sep 6 01:51:00.531833 env[1201]: time="2025-09-06T01:51:00.531758385Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-42nvm,Uid:a1e32e33-a785-4580-ae5b-d0382082341d,Namespace:kube-system,Attempt:0,}" Sep 6 01:51:00.541370 env[1201]: time="2025-09-06T01:51:00.541326984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-6ngzs,Uid:79b17d51-205b-45ba-9310-076cced172a7,Namespace:calico-system,Attempt:0,}" Sep 6 01:51:00.549560 env[1201]: time="2025-09-06T01:51:00.549510916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-4749k,Uid:f8303c83-3056-43e0-b522-817a0f1904bf,Namespace:calico-apiserver,Attempt:0,}" Sep 6 01:51:00.567227 env[1201]: time="2025-09-06T01:51:00.567161048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5tx9n,Uid:00b78940-5f73-4204-96b1-330a29fc1d16,Namespace:kube-system,Attempt:0,}" Sep 6 01:51:00.573564 env[1201]: time="2025-09-06T01:51:00.573520244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-m7mdj,Uid:04532c76-6801-4489-bbb9-c2be04557e1b,Namespace:calico-apiserver,Attempt:0,}" Sep 6 01:51:00.586111 env[1201]: time="2025-09-06T01:51:00.586054780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-798f59b8c7-m4nnq,Uid:7a0bb70b-816e-46fb-960c-13508504a78b,Namespace:calico-system,Attempt:0,}" Sep 6 01:51:00.599755 env[1201]: time="2025-09-06T01:51:00.599632443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c65c9557f-zhn44,Uid:87323d63-715c-4f88-bbb8-886336ab6529,Namespace:calico-system,Attempt:0,}" Sep 6 01:51:00.811447 systemd[1]: Created slice kubepods-besteffort-pod68bbc274_4386_44c8_80ff_be25dc03e0e0.slice. Sep 6 01:51:00.815149 env[1201]: time="2025-09-06T01:51:00.815101656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hx2m2,Uid:68bbc274-4386-44c8-80ff-be25dc03e0e0,Namespace:calico-system,Attempt:0,}" Sep 6 01:51:00.940526 env[1201]: time="2025-09-06T01:51:00.940330733Z" level=error msg="Failed to destroy network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:00.944184 env[1201]: time="2025-09-06T01:51:00.944123616Z" level=error msg="encountered an error cleaning up failed sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:00.944302 env[1201]: time="2025-09-06T01:51:00.944234185Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-m7mdj,Uid:04532c76-6801-4489-bbb9-c2be04557e1b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:00.954458 kubelet[1976]: E0906 01:51:00.944615 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:00.956742 kubelet[1976]: E0906 01:51:00.956702 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" Sep 6 01:51:00.957048 kubelet[1976]: E0906 01:51:00.957009 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" Sep 6 01:51:00.957392 kubelet[1976]: E0906 01:51:00.957210 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7dc7b8776b-m7mdj_calico-apiserver(04532c76-6801-4489-bbb9-c2be04557e1b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7dc7b8776b-m7mdj_calico-apiserver(04532c76-6801-4489-bbb9-c2be04557e1b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" podUID="04532c76-6801-4489-bbb9-c2be04557e1b" Sep 6 01:51:00.999011 kubelet[1976]: I0906 01:51:00.997343 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:01.012076 env[1201]: time="2025-09-06T01:51:01.010046356Z" level=info msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" Sep 6 01:51:01.015124 env[1201]: time="2025-09-06T01:51:01.015082476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 6 01:51:01.031806 env[1201]: time="2025-09-06T01:51:01.031627106Z" level=error msg="Failed to destroy network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.033043 env[1201]: time="2025-09-06T01:51:01.032957364Z" level=error msg="encountered an error cleaning up failed sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.033377 env[1201]: time="2025-09-06T01:51:01.033292213Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-42nvm,Uid:a1e32e33-a785-4580-ae5b-d0382082341d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.035635 kubelet[1976]: E0906 01:51:01.035588 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.035766 kubelet[1976]: E0906 01:51:01.035659 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-42nvm" Sep 6 01:51:01.035766 kubelet[1976]: E0906 01:51:01.035693 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-42nvm" Sep 6 01:51:01.035908 kubelet[1976]: E0906 01:51:01.035770 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-42nvm_kube-system(a1e32e33-a785-4580-ae5b-d0382082341d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-42nvm_kube-system(a1e32e33-a785-4580-ae5b-d0382082341d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-42nvm" podUID="a1e32e33-a785-4580-ae5b-d0382082341d" Sep 6 01:51:01.081499 env[1201]: time="2025-09-06T01:51:01.081384904Z" level=error msg="Failed to destroy network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.082670 env[1201]: time="2025-09-06T01:51:01.082624377Z" level=error msg="encountered an error cleaning up failed sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.083495 env[1201]: time="2025-09-06T01:51:01.083414824Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-6ngzs,Uid:79b17d51-205b-45ba-9310-076cced172a7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.086727 kubelet[1976]: E0906 01:51:01.083951 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.086727 kubelet[1976]: E0906 01:51:01.084037 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-6ngzs" Sep 6 01:51:01.086727 kubelet[1976]: E0906 01:51:01.084077 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-6ngzs" Sep 6 01:51:01.087007 kubelet[1976]: E0906 01:51:01.084155 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-54d579b49d-6ngzs_calico-system(79b17d51-205b-45ba-9310-076cced172a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-54d579b49d-6ngzs_calico-system(79b17d51-205b-45ba-9310-076cced172a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-6ngzs" podUID="79b17d51-205b-45ba-9310-076cced172a7" Sep 6 01:51:01.088697 env[1201]: time="2025-09-06T01:51:01.088651554Z" level=error msg="Failed to destroy network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.090021 env[1201]: time="2025-09-06T01:51:01.089187756Z" level=error msg="encountered an error cleaning up failed sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.090384 env[1201]: time="2025-09-06T01:51:01.090223919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-4749k,Uid:f8303c83-3056-43e0-b522-817a0f1904bf,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.092054 kubelet[1976]: E0906 01:51:01.090726 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.092054 kubelet[1976]: E0906 01:51:01.090809 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" Sep 6 01:51:01.092054 kubelet[1976]: E0906 01:51:01.090859 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" Sep 6 01:51:01.092578 kubelet[1976]: E0906 01:51:01.090951 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7dc7b8776b-4749k_calico-apiserver(f8303c83-3056-43e0-b522-817a0f1904bf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7dc7b8776b-4749k_calico-apiserver(f8303c83-3056-43e0-b522-817a0f1904bf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" podUID="f8303c83-3056-43e0-b522-817a0f1904bf" Sep 6 01:51:01.127518 env[1201]: time="2025-09-06T01:51:01.127398622Z" level=error msg="Failed to destroy network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.130142 env[1201]: time="2025-09-06T01:51:01.130097773Z" level=error msg="encountered an error cleaning up failed sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.130496 env[1201]: time="2025-09-06T01:51:01.130317547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c65c9557f-zhn44,Uid:87323d63-715c-4f88-bbb8-886336ab6529,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.138054 kubelet[1976]: E0906 01:51:01.135200 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.138054 kubelet[1976]: E0906 01:51:01.135302 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6c65c9557f-zhn44" Sep 6 01:51:01.138054 kubelet[1976]: E0906 01:51:01.135334 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6c65c9557f-zhn44" Sep 6 01:51:01.139255 kubelet[1976]: E0906 01:51:01.135421 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6c65c9557f-zhn44_calico-system(87323d63-715c-4f88-bbb8-886336ab6529)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6c65c9557f-zhn44_calico-system(87323d63-715c-4f88-bbb8-886336ab6529)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6c65c9557f-zhn44" podUID="87323d63-715c-4f88-bbb8-886336ab6529" Sep 6 01:51:01.143952 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc-shm.mount: Deactivated successfully. Sep 6 01:51:01.200488 env[1201]: time="2025-09-06T01:51:01.200397189Z" level=error msg="Failed to destroy network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.204615 env[1201]: time="2025-09-06T01:51:01.201744704Z" level=error msg="Failed to destroy network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.203613 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76-shm.mount: Deactivated successfully. Sep 6 01:51:01.207614 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a-shm.mount: Deactivated successfully. Sep 6 01:51:01.216084 env[1201]: time="2025-09-06T01:51:01.215938116Z" level=error msg="encountered an error cleaning up failed sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.226223 env[1201]: time="2025-09-06T01:51:01.226128963Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hx2m2,Uid:68bbc274-4386-44c8-80ff-be25dc03e0e0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.226489 env[1201]: time="2025-09-06T01:51:01.216999650Z" level=error msg="encountered an error cleaning up failed sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.226585 env[1201]: time="2025-09-06T01:51:01.226523805Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5tx9n,Uid:00b78940-5f73-4204-96b1-330a29fc1d16,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.228382 kubelet[1976]: E0906 01:51:01.226817 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.228382 kubelet[1976]: E0906 01:51:01.226818 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.228382 kubelet[1976]: E0906 01:51:01.226963 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:51:01.228382 kubelet[1976]: E0906 01:51:01.226994 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hx2m2" Sep 6 01:51:01.229075 kubelet[1976]: E0906 01:51:01.227056 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hx2m2_calico-system(68bbc274-4386-44c8-80ff-be25dc03e0e0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hx2m2_calico-system(68bbc274-4386-44c8-80ff-be25dc03e0e0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:51:01.231643 kubelet[1976]: E0906 01:51:01.226914 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-5tx9n" Sep 6 01:51:01.231643 kubelet[1976]: E0906 01:51:01.231456 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-5tx9n" Sep 6 01:51:01.231643 kubelet[1976]: E0906 01:51:01.231560 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-5tx9n_kube-system(00b78940-5f73-4204-96b1-330a29fc1d16)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-5tx9n_kube-system(00b78940-5f73-4204-96b1-330a29fc1d16)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-5tx9n" podUID="00b78940-5f73-4204-96b1-330a29fc1d16" Sep 6 01:51:01.236021 env[1201]: time="2025-09-06T01:51:01.235948867Z" level=error msg="Failed to destroy network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.239205 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888-shm.mount: Deactivated successfully. Sep 6 01:51:01.243301 env[1201]: time="2025-09-06T01:51:01.243217577Z" level=error msg="encountered an error cleaning up failed sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.243405 env[1201]: time="2025-09-06T01:51:01.243302891Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-798f59b8c7-m4nnq,Uid:7a0bb70b-816e-46fb-960c-13508504a78b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.244802 kubelet[1976]: E0906 01:51:01.243708 1976 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.244802 kubelet[1976]: E0906 01:51:01.243774 1976 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" Sep 6 01:51:01.244802 kubelet[1976]: E0906 01:51:01.243802 1976 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" Sep 6 01:51:01.245064 kubelet[1976]: E0906 01:51:01.243870 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-798f59b8c7-m4nnq_calico-system(7a0bb70b-816e-46fb-960c-13508504a78b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-798f59b8c7-m4nnq_calico-system(7a0bb70b-816e-46fb-960c-13508504a78b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" podUID="7a0bb70b-816e-46fb-960c-13508504a78b" Sep 6 01:51:01.260849 env[1201]: time="2025-09-06T01:51:01.260774394Z" level=error msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" failed" error="failed to destroy network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:01.261580 kubelet[1976]: E0906 01:51:01.261289 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:01.263901 kubelet[1976]: E0906 01:51:01.261416 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0"} Sep 6 01:51:01.264136 kubelet[1976]: E0906 01:51:01.264097 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04532c76-6801-4489-bbb9-c2be04557e1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:01.264380 kubelet[1976]: E0906 01:51:01.264333 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04532c76-6801-4489-bbb9-c2be04557e1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" podUID="04532c76-6801-4489-bbb9-c2be04557e1b" Sep 6 01:51:02.004717 kubelet[1976]: I0906 01:51:02.004661 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:02.006960 env[1201]: time="2025-09-06T01:51:02.005667881Z" level=info msg="StopPodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\"" Sep 6 01:51:02.008789 kubelet[1976]: I0906 01:51:02.008747 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:02.009969 env[1201]: time="2025-09-06T01:51:02.009931643Z" level=info msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" Sep 6 01:51:02.010527 kubelet[1976]: I0906 01:51:02.010496 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:02.011049 env[1201]: time="2025-09-06T01:51:02.011012264Z" level=info msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" Sep 6 01:51:02.012782 kubelet[1976]: I0906 01:51:02.012753 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:02.013324 env[1201]: time="2025-09-06T01:51:02.013282591Z" level=info msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" Sep 6 01:51:02.014968 kubelet[1976]: I0906 01:51:02.014939 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:02.015464 env[1201]: time="2025-09-06T01:51:02.015408840Z" level=info msg="StopPodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\"" Sep 6 01:51:02.017002 kubelet[1976]: I0906 01:51:02.016974 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:02.017547 env[1201]: time="2025-09-06T01:51:02.017513265Z" level=info msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" Sep 6 01:51:02.019051 kubelet[1976]: I0906 01:51:02.019023 1976 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:02.019609 env[1201]: time="2025-09-06T01:51:02.019564523Z" level=info msg="StopPodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\"" Sep 6 01:51:02.166783 env[1201]: time="2025-09-06T01:51:02.166705188Z" level=error msg="StopPodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" failed" error="failed to destroy network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.167686 kubelet[1976]: E0906 01:51:02.167634 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:02.168131 kubelet[1976]: E0906 01:51:02.167701 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34"} Sep 6 01:51:02.168131 kubelet[1976]: E0906 01:51:02.167750 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f8303c83-3056-43e0-b522-817a0f1904bf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.168131 kubelet[1976]: E0906 01:51:02.167802 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f8303c83-3056-43e0-b522-817a0f1904bf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" podUID="f8303c83-3056-43e0-b522-817a0f1904bf" Sep 6 01:51:02.188391 env[1201]: time="2025-09-06T01:51:02.188245701Z" level=error msg="StopPodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" failed" error="failed to destroy network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.189514 kubelet[1976]: E0906 01:51:02.189198 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:02.189514 kubelet[1976]: E0906 01:51:02.189283 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b"} Sep 6 01:51:02.189514 kubelet[1976]: E0906 01:51:02.189351 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a1e32e33-a785-4580-ae5b-d0382082341d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.189514 kubelet[1976]: E0906 01:51:02.189426 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a1e32e33-a785-4580-ae5b-d0382082341d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-42nvm" podUID="a1e32e33-a785-4580-ae5b-d0382082341d" Sep 6 01:51:02.202740 env[1201]: time="2025-09-06T01:51:02.202660013Z" level=error msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" failed" error="failed to destroy network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.203318 kubelet[1976]: E0906 01:51:02.203256 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:02.203454 kubelet[1976]: E0906 01:51:02.203337 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8"} Sep 6 01:51:02.203454 kubelet[1976]: E0906 01:51:02.203387 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"79b17d51-205b-45ba-9310-076cced172a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.203454 kubelet[1976]: E0906 01:51:02.203438 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"79b17d51-205b-45ba-9310-076cced172a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-6ngzs" podUID="79b17d51-205b-45ba-9310-076cced172a7" Sep 6 01:51:02.213610 env[1201]: time="2025-09-06T01:51:02.213494916Z" level=error msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" failed" error="failed to destroy network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.213960 env[1201]: time="2025-09-06T01:51:02.213742431Z" level=error msg="StopPodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" failed" error="failed to destroy network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.214839 kubelet[1976]: E0906 01:51:02.214560 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:02.214839 kubelet[1976]: E0906 01:51:02.214654 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc"} Sep 6 01:51:02.214839 kubelet[1976]: E0906 01:51:02.214726 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"87323d63-715c-4f88-bbb8-886336ab6529\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.214839 kubelet[1976]: E0906 01:51:02.214759 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:02.215205 kubelet[1976]: E0906 01:51:02.214764 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"87323d63-715c-4f88-bbb8-886336ab6529\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6c65c9557f-zhn44" podUID="87323d63-715c-4f88-bbb8-886336ab6529" Sep 6 01:51:02.215205 kubelet[1976]: E0906 01:51:02.214803 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a"} Sep 6 01:51:02.215205 kubelet[1976]: E0906 01:51:02.214843 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68bbc274-4386-44c8-80ff-be25dc03e0e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.215205 kubelet[1976]: E0906 01:51:02.214872 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68bbc274-4386-44c8-80ff-be25dc03e0e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:51:02.215746 env[1201]: time="2025-09-06T01:51:02.215700969Z" level=error msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" failed" error="failed to destroy network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.216201 env[1201]: time="2025-09-06T01:51:02.215981456Z" level=error msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" failed" error="failed to destroy network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:02.216782 kubelet[1976]: E0906 01:51:02.216574 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:02.216782 kubelet[1976]: E0906 01:51:02.216640 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76"} Sep 6 01:51:02.216782 kubelet[1976]: E0906 01:51:02.216694 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"00b78940-5f73-4204-96b1-330a29fc1d16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.216782 kubelet[1976]: E0906 01:51:02.216723 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"00b78940-5f73-4204-96b1-330a29fc1d16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-5tx9n" podUID="00b78940-5f73-4204-96b1-330a29fc1d16" Sep 6 01:51:02.217753 kubelet[1976]: E0906 01:51:02.217138 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:02.217753 kubelet[1976]: E0906 01:51:02.217175 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888"} Sep 6 01:51:02.217753 kubelet[1976]: E0906 01:51:02.217211 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7a0bb70b-816e-46fb-960c-13508504a78b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:02.217753 kubelet[1976]: E0906 01:51:02.217238 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7a0bb70b-816e-46fb-960c-13508504a78b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" podUID="7a0bb70b-816e-46fb-960c-13508504a78b" Sep 6 01:51:03.767318 kubelet[1976]: I0906 01:51:03.767277 1976 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:51:03.884000 audit[3078]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:03.893229 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 6 01:51:03.893411 kernel: audit: type=1325 audit(1757123463.884:996): table=filter:99 family=2 entries=21 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:03.884000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffee6210d80 a2=0 a3=7ffee6210d6c items=0 ppid=2097 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:03.909073 kernel: audit: type=1300 audit(1757123463.884:996): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffee6210d80 a2=0 a3=7ffee6210d6c items=0 ppid=2097 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:03.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:03.913514 kernel: audit: type=1327 audit(1757123463.884:996): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:03.913624 kernel: audit: type=1325 audit(1757123463.908:997): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:03.908000 audit[3078]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:03.908000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffee6210d80 a2=0 a3=7ffee6210d6c items=0 ppid=2097 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:03.925448 kernel: audit: type=1300 audit(1757123463.908:997): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffee6210d80 a2=0 a3=7ffee6210d6c items=0 ppid=2097 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:03.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:03.929547 kernel: audit: type=1327 audit(1757123463.908:997): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:12.805312 env[1201]: time="2025-09-06T01:51:12.805202347Z" level=info msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" Sep 6 01:51:12.864042 env[1201]: time="2025-09-06T01:51:12.863966314Z" level=error msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" failed" error="failed to destroy network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:12.864808 kubelet[1976]: E0906 01:51:12.864682 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:12.865491 kubelet[1976]: E0906 01:51:12.864864 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0"} Sep 6 01:51:12.865491 kubelet[1976]: E0906 01:51:12.864974 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04532c76-6801-4489-bbb9-c2be04557e1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:12.865491 kubelet[1976]: E0906 01:51:12.865070 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04532c76-6801-4489-bbb9-c2be04557e1b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" podUID="04532c76-6801-4489-bbb9-c2be04557e1b" Sep 6 01:51:13.761801 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount246076241.mount: Deactivated successfully. Sep 6 01:51:13.815611 env[1201]: time="2025-09-06T01:51:13.814782091Z" level=info msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" Sep 6 01:51:13.823251 env[1201]: time="2025-09-06T01:51:13.823198964Z" level=info msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" Sep 6 01:51:13.856227 env[1201]: time="2025-09-06T01:51:13.856165238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:13.864028 env[1201]: time="2025-09-06T01:51:13.863971488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:13.868337 env[1201]: time="2025-09-06T01:51:13.868276979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:13.879215 env[1201]: time="2025-09-06T01:51:13.878830235Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:13.888086 env[1201]: time="2025-09-06T01:51:13.887900351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 6 01:51:13.965534 env[1201]: time="2025-09-06T01:51:13.965463309Z" level=info msg="CreateContainer within sandbox \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 6 01:51:13.966579 env[1201]: time="2025-09-06T01:51:13.966324636Z" level=error msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" failed" error="failed to destroy network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:13.968955 kubelet[1976]: E0906 01:51:13.968722 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:13.968955 kubelet[1976]: E0906 01:51:13.968808 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a"} Sep 6 01:51:13.968955 kubelet[1976]: E0906 01:51:13.968851 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68bbc274-4386-44c8-80ff-be25dc03e0e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:13.968955 kubelet[1976]: E0906 01:51:13.968905 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68bbc274-4386-44c8-80ff-be25dc03e0e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hx2m2" podUID="68bbc274-4386-44c8-80ff-be25dc03e0e0" Sep 6 01:51:13.983280 env[1201]: time="2025-09-06T01:51:13.982977917Z" level=error msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" failed" error="failed to destroy network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:13.984242 kubelet[1976]: E0906 01:51:13.984163 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:13.992395 kubelet[1976]: E0906 01:51:13.984261 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76"} Sep 6 01:51:13.992395 kubelet[1976]: E0906 01:51:13.984309 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"00b78940-5f73-4204-96b1-330a29fc1d16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:13.992395 kubelet[1976]: E0906 01:51:13.984398 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"00b78940-5f73-4204-96b1-330a29fc1d16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-5tx9n" podUID="00b78940-5f73-4204-96b1-330a29fc1d16" Sep 6 01:51:14.021391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount543603598.mount: Deactivated successfully. Sep 6 01:51:14.026685 env[1201]: time="2025-09-06T01:51:14.026636743Z" level=info msg="CreateContainer within sandbox \"47f1cb0ab0df91e0534e3f1415b4aa018d97a58846bfbd48dc5856d069c032df\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac\"" Sep 6 01:51:14.027755 env[1201]: time="2025-09-06T01:51:14.027722396Z" level=info msg="StartContainer for \"d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac\"" Sep 6 01:51:14.056970 systemd[1]: Started cri-containerd-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac.scope. Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.127208 kernel: audit: type=1400 audit(1757123474.113:998): avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.127541 kernel: audit: type=1300 audit(1757123474.113:998): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff441fbe918 items=0 ppid=2415 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:14.113000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff441fbe918 items=0 ppid=2415 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:14.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666130386464373963623165393766316561663163646466393161 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.145322 kernel: audit: type=1327 audit(1757123474.113:998): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666130386464373963623165393766316561663163646466393161 Sep 6 01:51:14.145624 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.145690 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.161295 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.161515 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.173102 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.173227 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit: BPF prog-id=136 op=LOAD Sep 6 01:51:14.185627 kernel: audit: type=1400 audit(1757123474.113:999): avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000353d68 items=0 ppid=2415 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:14.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666130386464373963623165393766316561663163646466393161 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.113000 audit: BPF prog-id=137 op=LOAD Sep 6 01:51:14.113000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000353db8 items=0 ppid=2415 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:14.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666130386464373963623165393766316561663163646466393161 Sep 6 01:51:14.114000 audit: BPF prog-id=137 op=UNLOAD Sep 6 01:51:14.114000 audit: BPF prog-id=136 op=UNLOAD Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:14.114000 audit: BPF prog-id=138 op=LOAD Sep 6 01:51:14.114000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000353e48 items=0 ppid=2415 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:14.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666130386464373963623165393766316561663163646466393161 Sep 6 01:51:14.201857 env[1201]: time="2025-09-06T01:51:14.201778764Z" level=info msg="StartContainer for \"d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac\" returns successfully" Sep 6 01:51:14.676456 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 6 01:51:14.676786 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 6 01:51:14.805928 env[1201]: time="2025-09-06T01:51:14.805875485Z" level=info msg="StopPodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\"" Sep 6 01:51:14.806368 env[1201]: time="2025-09-06T01:51:14.806302416Z" level=info msg="StopPodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\"" Sep 6 01:51:14.807186 env[1201]: time="2025-09-06T01:51:14.807145797Z" level=info msg="StopPodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\"" Sep 6 01:51:14.807909 env[1201]: time="2025-09-06T01:51:14.807867279Z" level=info msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" Sep 6 01:51:14.808599 env[1201]: time="2025-09-06T01:51:14.808562731Z" level=info msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" Sep 6 01:51:14.967161 env[1201]: time="2025-09-06T01:51:14.967043102Z" level=error msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" failed" error="failed to destroy network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:14.968564 kubelet[1976]: E0906 01:51:14.968182 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:14.968564 kubelet[1976]: E0906 01:51:14.968288 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888"} Sep 6 01:51:14.968564 kubelet[1976]: E0906 01:51:14.968360 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7a0bb70b-816e-46fb-960c-13508504a78b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:14.968564 kubelet[1976]: E0906 01:51:14.968438 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7a0bb70b-816e-46fb-960c-13508504a78b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" podUID="7a0bb70b-816e-46fb-960c-13508504a78b" Sep 6 01:51:15.017546 env[1201]: time="2025-09-06T01:51:15.017459223Z" level=error msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" failed" error="failed to destroy network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 6 01:51:15.018363 kubelet[1976]: E0906 01:51:15.017998 1976 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:15.018363 kubelet[1976]: E0906 01:51:15.018095 1976 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8"} Sep 6 01:51:15.018363 kubelet[1976]: E0906 01:51:15.018157 1976 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"79b17d51-205b-45ba-9310-076cced172a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 6 01:51:15.018363 kubelet[1976]: E0906 01:51:15.018193 1976 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"79b17d51-205b-45ba-9310-076cced172a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-6ngzs" podUID="79b17d51-205b-45ba-9310-076cced172a7" Sep 6 01:51:15.143915 systemd[1]: run-containerd-runc-k8s.io-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac-runc.JKlNAZ.mount: Deactivated successfully. Sep 6 01:51:15.316641 kubelet[1976]: I0906 01:51:15.311818 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-7jpvv" podStartSLOduration=2.58510901 podStartE2EDuration="29.305949604s" podCreationTimestamp="2025-09-06 01:50:46 +0000 UTC" firstStartedPulling="2025-09-06 01:50:47.190733908 +0000 UTC m=+21.613353682" lastFinishedPulling="2025-09-06 01:51:13.9115745 +0000 UTC m=+48.334194276" observedRunningTime="2025-09-06 01:51:15.289522371 +0000 UTC m=+49.712142154" watchObservedRunningTime="2025-09-06 01:51:15.305949604 +0000 UTC m=+49.728569385" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.339 [INFO][3226] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.339 [INFO][3226] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" iface="eth0" netns="/var/run/netns/cni-7e55d757-f9db-2a7a-1a7a-39a4d107fbf7" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.339 [INFO][3226] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" iface="eth0" netns="/var/run/netns/cni-7e55d757-f9db-2a7a-1a7a-39a4d107fbf7" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.339 [INFO][3226] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" iface="eth0" netns="/var/run/netns/cni-7e55d757-f9db-2a7a-1a7a-39a4d107fbf7" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.339 [INFO][3226] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.339 [INFO][3226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.518 [INFO][3292] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.521 [INFO][3292] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.521 [INFO][3292] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.549 [WARNING][3292] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.549 [INFO][3292] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.559 [INFO][3292] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:15.564891 env[1201]: 2025-09-06 01:51:15.562 [INFO][3226] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:15.570848 env[1201]: time="2025-09-06T01:51:15.570235692Z" level=info msg="TearDown network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" successfully" Sep 6 01:51:15.570848 env[1201]: time="2025-09-06T01:51:15.570287144Z" level=info msg="StopPodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" returns successfully" Sep 6 01:51:15.568338 systemd[1]: run-netns-cni\x2d7e55d757\x2df9db\x2d2a7a\x2d1a7a\x2d39a4d107fbf7.mount: Deactivated successfully. Sep 6 01:51:15.580028 env[1201]: time="2025-09-06T01:51:15.579970901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-42nvm,Uid:a1e32e33-a785-4580-ae5b-d0382082341d,Namespace:kube-system,Attempt:1,}" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.235 [INFO][3237] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.236 [INFO][3237] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" iface="eth0" netns="/var/run/netns/cni-694d208f-d4c0-b3da-81ed-23783bd0b1e5" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.236 [INFO][3237] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" iface="eth0" netns="/var/run/netns/cni-694d208f-d4c0-b3da-81ed-23783bd0b1e5" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.238 [INFO][3237] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" iface="eth0" netns="/var/run/netns/cni-694d208f-d4c0-b3da-81ed-23783bd0b1e5" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.238 [INFO][3237] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.238 [INFO][3237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.519 [INFO][3280] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.520 [INFO][3280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.559 [INFO][3280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.603 [WARNING][3280] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.603 [INFO][3280] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.622 [INFO][3280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:15.632424 env[1201]: 2025-09-06 01:51:15.627 [INFO][3237] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:15.633546 env[1201]: time="2025-09-06T01:51:15.633460794Z" level=info msg="TearDown network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" successfully" Sep 6 01:51:15.633700 env[1201]: time="2025-09-06T01:51:15.633668550Z" level=info msg="StopPodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" returns successfully" Sep 6 01:51:15.634760 env[1201]: time="2025-09-06T01:51:15.634724023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-4749k,Uid:f8303c83-3056-43e0-b522-817a0f1904bf,Namespace:calico-apiserver,Attempt:1,}" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.282 [INFO][3238] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.282 [INFO][3238] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" iface="eth0" netns="/var/run/netns/cni-24ffe89a-a1a3-0935-f772-612723d5cb6a" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.282 [INFO][3238] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" iface="eth0" netns="/var/run/netns/cni-24ffe89a-a1a3-0935-f772-612723d5cb6a" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.282 [INFO][3238] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" iface="eth0" netns="/var/run/netns/cni-24ffe89a-a1a3-0935-f772-612723d5cb6a" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.282 [INFO][3238] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.282 [INFO][3238] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.519 [INFO][3286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.520 [INFO][3286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.622 [INFO][3286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.643 [WARNING][3286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.643 [INFO][3286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.650 [INFO][3286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:15.654819 env[1201]: 2025-09-06 01:51:15.652 [INFO][3238] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:15.656666 env[1201]: time="2025-09-06T01:51:15.655049552Z" level=info msg="TearDown network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" successfully" Sep 6 01:51:15.656666 env[1201]: time="2025-09-06T01:51:15.655095043Z" level=info msg="StopPodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" returns successfully" Sep 6 01:51:15.657115 env[1201]: time="2025-09-06T01:51:15.657074543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c65c9557f-zhn44,Uid:87323d63-715c-4f88-bbb8-886336ab6529,Namespace:calico-system,Attempt:1,}" Sep 6 01:51:15.764885 systemd[1]: run-netns-cni\x2d24ffe89a\x2da1a3\x2d0935\x2df772\x2d612723d5cb6a.mount: Deactivated successfully. Sep 6 01:51:15.765466 systemd[1]: run-netns-cni\x2d694d208f\x2dd4c0\x2db3da\x2d81ed\x2d23783bd0b1e5.mount: Deactivated successfully. Sep 6 01:51:16.128406 systemd[1]: run-containerd-runc-k8s.io-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac-runc.xfSEvk.mount: Deactivated successfully. Sep 6 01:51:16.297413 systemd-networkd[1027]: cali216460029a9: Link UP Sep 6 01:51:16.310819 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:51:16.316584 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali216460029a9: link becomes ready Sep 6 01:51:16.321127 systemd-networkd[1027]: cali216460029a9: Gained carrier Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.792 [INFO][3311] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.829 [INFO][3311] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0 calico-apiserver-7dc7b8776b- calico-apiserver f8303c83-3056-43e0-b522-817a0f1904bf 905 0 2025-09-06 01:50:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dc7b8776b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com calico-apiserver-7dc7b8776b-4749k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali216460029a9 [] [] }} ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.829 [INFO][3311] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.980 [INFO][3343] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" HandleID="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.980 [INFO][3343] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" HandleID="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-lvab0.gb1.brightbox.com", "pod":"calico-apiserver-7dc7b8776b-4749k", "timestamp":"2025-09-06 01:51:15.980154967 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.980 [INFO][3343] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.980 [INFO][3343] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.980 [INFO][3343] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:15.992 [INFO][3343] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.065 [INFO][3343] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.079 [INFO][3343] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.082 [INFO][3343] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.086 [INFO][3343] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.087 [INFO][3343] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.097 [INFO][3343] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794 Sep 6 01:51:16.373509 env[1201]: 2025-09-06 01:51:16.113 [INFO][3343] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.135 [ERROR][3343] ipam/customresource.go 184: Error updating resource Key=IPAMBlock(192-168-83-128-26) Name="192-168-83-128-26" Resource="IPAMBlocks" Value=&v3.IPAMBlock{TypeMeta:v1.TypeMeta{Kind:"IPAMBlock", APIVersion:"crd.projectcalico.org/v1"}, ObjectMeta:v1.ObjectMeta{Name:"192-168-83-128-26", GenerateName:"", Namespace:"", SelfLink:"", UID:"", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.IPAMBlockSpec{CIDR:"192.168.83.128/26", Affinity:(*string)(0xc00032a9d0), Allocations:[]*int{(*int)(0xc0004ed220), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil)}, Unallocated:[]int{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63}, Attributes:[]v3.AllocationAttribute{v3.AllocationAttribute{AttrPrimary:(*string)(0xc0002cd600), AttrSecondary:map[string]string{"namespace":"calico-apiserver", "node":"srv-lvab0.gb1.brightbox.com", "pod":"calico-apiserver-7dc7b8776b-4749k", "timestamp":"2025-09-06 01:51:15.980154967 +0000 UTC"}}}, SequenceNumber:0x18628e7de8728a36, SequenceNumberForAllocation:map[string]uint64{"0":0x18628e7de8728a35}, Deleted:false, DeprecatedStrictAffinity:false}} error=Operation cannot be fulfilled on ipamblocks.crd.projectcalico.org "192-168-83-128-26": the object has been modified; please apply your changes to the latest version and try again Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.135 [INFO][3343] ipam/ipam.go 1247: Failed to update block block=192.168.83.128/26 error=update conflict: IPAMBlock(192-168-83-128-26) handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.177 [INFO][3343] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.181 [INFO][3343] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794 Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.200 [INFO][3343] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.215 [INFO][3343] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.129/26] block=192.168.83.128/26 handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.215 [INFO][3343] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.129/26] handle="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.215 [INFO][3343] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:16.376666 env[1201]: 2025-09-06 01:51:16.215 [INFO][3343] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.129/26] IPv6=[] ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" HandleID="k8s-pod-network.ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.378578 env[1201]: 2025-09-06 01:51:16.222 [INFO][3311] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8303c83-3056-43e0-b522-817a0f1904bf", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-7dc7b8776b-4749k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali216460029a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:16.378578 env[1201]: 2025-09-06 01:51:16.222 [INFO][3311] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.129/32] ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.378578 env[1201]: 2025-09-06 01:51:16.222 [INFO][3311] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali216460029a9 ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.378578 env[1201]: 2025-09-06 01:51:16.335 [INFO][3311] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.378578 env[1201]: 2025-09-06 01:51:16.338 [INFO][3311] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8303c83-3056-43e0-b522-817a0f1904bf", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794", Pod:"calico-apiserver-7dc7b8776b-4749k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali216460029a9", MAC:"26:ed:37:8f:20:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:16.378578 env[1201]: 2025-09-06 01:51:16.357 [INFO][3311] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-4749k" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:16.440326 env[1201]: time="2025-09-06T01:51:16.440124242Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:16.441227 env[1201]: time="2025-09-06T01:51:16.441166639Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:16.441719 env[1201]: time="2025-09-06T01:51:16.441415313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:16.442110 env[1201]: time="2025-09-06T01:51:16.442050755Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794 pid=3402 runtime=io.containerd.runc.v2 Sep 6 01:51:16.456452 systemd-networkd[1027]: cali3b54244d304: Link UP Sep 6 01:51:16.460639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3b54244d304: link becomes ready Sep 6 01:51:16.461071 systemd-networkd[1027]: cali3b54244d304: Gained carrier Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:15.657 [INFO][3300] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:15.719 [INFO][3300] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0 coredns-668d6bf9bc- kube-system a1e32e33-a785-4580-ae5b-d0382082341d 909 0 2025-09-06 01:50:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com coredns-668d6bf9bc-42nvm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3b54244d304 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:15.719 [INFO][3300] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:15.990 [INFO][3333] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" HandleID="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:15.991 [INFO][3333] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" HandleID="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332c60), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-42nvm", "timestamp":"2025-09-06 01:51:15.984243951 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:15.996 [INFO][3333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.215 [INFO][3333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.215 [INFO][3333] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.257 [INFO][3333] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.295 [INFO][3333] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.343 [INFO][3333] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.369 [INFO][3333] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.381 [INFO][3333] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.381 [INFO][3333] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.406 [INFO][3333] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.419 [INFO][3333] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.437 [INFO][3333] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.130/26] block=192.168.83.128/26 handle="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.437 [INFO][3333] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.130/26] handle="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.437 [INFO][3333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:16.505071 env[1201]: 2025-09-06 01:51:16.437 [INFO][3333] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.130/26] IPv6=[] ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" HandleID="k8s-pod-network.d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.506361 env[1201]: 2025-09-06 01:51:16.440 [INFO][3300] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a1e32e33-a785-4580-ae5b-d0382082341d", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-42nvm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3b54244d304", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:16.506361 env[1201]: 2025-09-06 01:51:16.446 [INFO][3300] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.130/32] ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.506361 env[1201]: 2025-09-06 01:51:16.446 [INFO][3300] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3b54244d304 ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.506361 env[1201]: 2025-09-06 01:51:16.463 [INFO][3300] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.506361 env[1201]: 2025-09-06 01:51:16.464 [INFO][3300] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a1e32e33-a785-4580-ae5b-d0382082341d", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b", Pod:"coredns-668d6bf9bc-42nvm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3b54244d304", MAC:"b2:f7:d5:e1:03:01", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:16.506361 env[1201]: 2025-09-06 01:51:16.499 [INFO][3300] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b" Namespace="kube-system" Pod="coredns-668d6bf9bc-42nvm" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:16.538696 systemd[1]: Started cri-containerd-ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794.scope. Sep 6 01:51:16.581033 env[1201]: time="2025-09-06T01:51:16.580921432Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:16.581328 env[1201]: time="2025-09-06T01:51:16.581274854Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:16.581502 env[1201]: time="2025-09-06T01:51:16.581444696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:16.581874 env[1201]: time="2025-09-06T01:51:16.581824537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b pid=3437 runtime=io.containerd.runc.v2 Sep 6 01:51:16.585547 systemd-networkd[1027]: cali5c15f0e618b: Link UP Sep 6 01:51:16.594741 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5c15f0e618b: link becomes ready Sep 6 01:51:16.595791 systemd-networkd[1027]: cali5c15f0e618b: Gained carrier Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:15.755 [INFO][3320] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:15.788 [INFO][3320] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0 whisker-6c65c9557f- calico-system 87323d63-715c-4f88-bbb8-886336ab6529 914 0 2025-09-06 01:50:50 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6c65c9557f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com whisker-6c65c9557f-zhn44 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali5c15f0e618b [] [] }} ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:15.788 [INFO][3320] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.009 [INFO][3340] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.010 [INFO][3340] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251ab0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"whisker-6c65c9557f-zhn44", "timestamp":"2025-09-06 01:51:16.009924579 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.010 [INFO][3340] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.437 [INFO][3340] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.437 [INFO][3340] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.476 [INFO][3340] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.503 [INFO][3340] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.515 [INFO][3340] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.520 [INFO][3340] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.528 [INFO][3340] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.528 [INFO][3340] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.536 [INFO][3340] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.556 [INFO][3340] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.567 [INFO][3340] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.131/26] block=192.168.83.128/26 handle="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.567 [INFO][3340] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.131/26] handle="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.567 [INFO][3340] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:16.622523 env[1201]: 2025-09-06 01:51:16.567 [INFO][3340] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.131/26] IPv6=[] ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.624023 env[1201]: 2025-09-06 01:51:16.570 [INFO][3320] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0", GenerateName:"whisker-6c65c9557f-", Namespace:"calico-system", SelfLink:"", UID:"87323d63-715c-4f88-bbb8-886336ab6529", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c65c9557f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"whisker-6c65c9557f-zhn44", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.83.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali5c15f0e618b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:16.624023 env[1201]: 2025-09-06 01:51:16.570 [INFO][3320] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.131/32] ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.624023 env[1201]: 2025-09-06 01:51:16.571 [INFO][3320] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5c15f0e618b ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.624023 env[1201]: 2025-09-06 01:51:16.597 [INFO][3320] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.624023 env[1201]: 2025-09-06 01:51:16.597 [INFO][3320] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0", GenerateName:"whisker-6c65c9557f-", Namespace:"calico-system", SelfLink:"", UID:"87323d63-715c-4f88-bbb8-886336ab6529", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c65c9557f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af", Pod:"whisker-6c65c9557f-zhn44", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.83.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali5c15f0e618b", MAC:"4e:a8:25:ab:85:cc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:16.624023 env[1201]: 2025-09-06 01:51:16.613 [INFO][3320] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Namespace="calico-system" Pod="whisker-6c65c9557f-zhn44" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:16.635318 systemd[1]: Started cri-containerd-d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b.scope. Sep 6 01:51:16.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.654000 audit: BPF prog-id=139 op=LOAD Sep 6 01:51:16.655000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.655000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3402 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353230636565303061346636323539636264633339653730303239 Sep 6 01:51:16.655000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.655000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3402 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353230636565303061346636323539636264633339653730303239 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit: BPF prog-id=140 op=LOAD Sep 6 01:51:16.657000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000293680 items=0 ppid=3402 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353230636565303061346636323539636264633339653730303239 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.657000 audit: BPF prog-id=141 op=LOAD Sep 6 01:51:16.657000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002936c8 items=0 ppid=3402 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353230636565303061346636323539636264633339653730303239 Sep 6 01:51:16.660000 audit: BPF prog-id=141 op=UNLOAD Sep 6 01:51:16.660000 audit: BPF prog-id=140 op=UNLOAD Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.660000 audit: BPF prog-id=142 op=LOAD Sep 6 01:51:16.660000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000293ad8 items=0 ppid=3402 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353230636565303061346636323539636264633339653730303239 Sep 6 01:51:16.672093 env[1201]: time="2025-09-06T01:51:16.672007110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:16.672321 env[1201]: time="2025-09-06T01:51:16.672268929Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:16.672560 env[1201]: time="2025-09-06T01:51:16.672437403Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:16.673093 env[1201]: time="2025-09-06T01:51:16.673039179Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af pid=3482 runtime=io.containerd.runc.v2 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.678000 audit: BPF prog-id=143 op=LOAD Sep 6 01:51:16.680000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.680000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3437 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432653630613831353735313336386561393135636461346465643932 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3437 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432653630613831353735313336386561393135636461346465643932 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit: BPF prog-id=144 op=LOAD Sep 6 01:51:16.683000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000390f90 items=0 ppid=3437 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432653630613831353735313336386561393135636461346465643932 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit: BPF prog-id=145 op=LOAD Sep 6 01:51:16.683000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390fd8 items=0 ppid=3437 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432653630613831353735313336386561393135636461346465643932 Sep 6 01:51:16.683000 audit: BPF prog-id=145 op=UNLOAD Sep 6 01:51:16.683000 audit: BPF prog-id=144 op=UNLOAD Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { perfmon } for pid=3449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit[3449]: AVC avc: denied { bpf } for pid=3449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.683000 audit: BPF prog-id=146 op=LOAD Sep 6 01:51:16.683000 audit[3449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003913e8 items=0 ppid=3437 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432653630613831353735313336386561393135636461346465643932 Sep 6 01:51:16.725068 systemd[1]: Started cri-containerd-0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af.scope. Sep 6 01:51:16.766102 env[1201]: time="2025-09-06T01:51:16.766042899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-4749k,Uid:f8303c83-3056-43e0-b522-817a0f1904bf,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794\"" Sep 6 01:51:16.771102 env[1201]: time="2025-09-06T01:51:16.771034341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.786000 audit: BPF prog-id=147 op=LOAD Sep 6 01:51:16.788000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.788000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3482 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343763636538303630343234373930373738626631663634646661 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3482 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343763636538303630343234373930373738626631663634646661 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit: BPF prog-id=148 op=LOAD Sep 6 01:51:16.789000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000323a60 items=0 ppid=3482 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343763636538303630343234373930373738626631663634646661 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit: BPF prog-id=149 op=LOAD Sep 6 01:51:16.789000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000323aa8 items=0 ppid=3482 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343763636538303630343234373930373738626631663634646661 Sep 6 01:51:16.789000 audit: BPF prog-id=149 op=UNLOAD Sep 6 01:51:16.789000 audit: BPF prog-id=148 op=UNLOAD Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.789000 audit: BPF prog-id=150 op=LOAD Sep 6 01:51:16.789000 audit[3493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000323eb8 items=0 ppid=3482 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343763636538303630343234373930373738626631663634646661 Sep 6 01:51:16.801840 env[1201]: time="2025-09-06T01:51:16.801787023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-42nvm,Uid:a1e32e33-a785-4580-ae5b-d0382082341d,Namespace:kube-system,Attempt:1,} returns sandbox id \"d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b\"" Sep 6 01:51:16.808015 env[1201]: time="2025-09-06T01:51:16.807963408Z" level=info msg="CreateContainer within sandbox \"d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 6 01:51:16.837013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2480993191.mount: Deactivated successfully. Sep 6 01:51:16.851696 env[1201]: time="2025-09-06T01:51:16.851642405Z" level=info msg="CreateContainer within sandbox \"d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9db4c8579d698967142a6427446dd3e94da7c38f8ede92b1968120b84255e1cb\"" Sep 6 01:51:16.852891 env[1201]: time="2025-09-06T01:51:16.852856654Z" level=info msg="StartContainer for \"9db4c8579d698967142a6427446dd3e94da7c38f8ede92b1968120b84255e1cb\"" Sep 6 01:51:16.898402 systemd[1]: Started cri-containerd-9db4c8579d698967142a6427446dd3e94da7c38f8ede92b1968120b84255e1cb.scope. Sep 6 01:51:16.918876 env[1201]: time="2025-09-06T01:51:16.918818040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c65c9557f-zhn44,Uid:87323d63-715c-4f88-bbb8-886336ab6529,Namespace:calico-system,Attempt:1,} returns sandbox id \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\"" Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.939000 audit: BPF prog-id=151 op=LOAD Sep 6 01:51:16.941000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.941000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3437 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623463383537396436393839363731343261363432373434366464 Sep 6 01:51:16.941000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.941000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3437 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623463383537396436393839363731343261363432373434366464 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.942000 audit: BPF prog-id=152 op=LOAD Sep 6 01:51:16.942000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025bf0 items=0 ppid=3437 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623463383537396436393839363731343261363432373434366464 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.943000 audit: BPF prog-id=153 op=LOAD Sep 6 01:51:16.943000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025c38 items=0 ppid=3437 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623463383537396436393839363731343261363432373434366464 Sep 6 01:51:16.944000 audit: BPF prog-id=153 op=UNLOAD Sep 6 01:51:16.945000 audit: BPF prog-id=152 op=UNLOAD Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:16.945000 audit: BPF prog-id=154 op=LOAD Sep 6 01:51:16.945000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00026e048 items=0 ppid=3437 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:16.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623463383537396436393839363731343261363432373434366464 Sep 6 01:51:16.970847 env[1201]: time="2025-09-06T01:51:16.970790937Z" level=info msg="StartContainer for \"9db4c8579d698967142a6427446dd3e94da7c38f8ede92b1968120b84255e1cb\" returns successfully" Sep 6 01:51:17.139000 audit[3551]: AVC avc: denied { getattr } for pid=3551 comm="coredns" path="cgroup:[4026532858]" dev="nsfs" ino=4026532858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c690,c910 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 6 01:51:17.139000 audit[3551]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4ed8 a3=0 items=0 ppid=3437 pid=3551 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c690,c910 key=(null) Sep 6 01:51:17.139000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 6 01:51:17.147079 kubelet[1976]: I0906 01:51:17.147012 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-42nvm" podStartSLOduration=47.146987959 podStartE2EDuration="47.146987959s" podCreationTimestamp="2025-09-06 01:50:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:51:17.145050087 +0000 UTC m=+51.567669870" watchObservedRunningTime="2025-09-06 01:51:17.146987959 +0000 UTC m=+51.569607739" Sep 6 01:51:17.186000 audit[3569]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=3569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:17.186000 audit[3569]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff18c370e0 a2=0 a3=7fff18c370cc items=0 ppid=2097 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:17.193000 audit[3569]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:17.193000 audit[3569]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff18c370e0 a2=0 a3=0 items=0 ppid=2097 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:17.480000 audit[3608]: AVC avc: denied { write } for pid=3608 comm="tee" name="fd" dev="proc" ino=31027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.480000 audit[3608]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd67f977b2 a2=241 a3=1b6 items=1 ppid=3588 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.480000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 6 01:51:17.480000 audit: PATH item=0 name="/dev/fd/63" inode=31020 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.480000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.487000 audit[3613]: AVC avc: denied { write } for pid=3613 comm="tee" name="fd" dev="proc" ino=31035 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.487000 audit[3613]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcce40c7c1 a2=241 a3=1b6 items=1 ppid=3583 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.487000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 6 01:51:17.487000 audit: PATH item=0 name="/dev/fd/63" inode=30475 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.496000 audit[3618]: AVC avc: denied { write } for pid=3618 comm="tee" name="fd" dev="proc" ino=30482 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.496000 audit[3618]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4b5ec7b1 a2=241 a3=1b6 items=1 ppid=3586 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.496000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 6 01:51:17.496000 audit: PATH item=0 name="/dev/fd/63" inode=31041 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.496000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.523000 audit[3620]: AVC avc: denied { write } for pid=3620 comm="tee" name="fd" dev="proc" ino=30490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.523000 audit[3620]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc47dfd7c3 a2=241 a3=1b6 items=1 ppid=3585 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.523000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 6 01:51:17.523000 audit: PATH item=0 name="/dev/fd/63" inode=31044 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.503738 systemd-networkd[1027]: cali216460029a9: Gained IPv6LL Sep 6 01:51:17.569000 audit[3631]: AVC avc: denied { write } for pid=3631 comm="tee" name="fd" dev="proc" ino=30498 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.569000 audit[3631]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc16eb67c2 a2=241 a3=1b6 items=1 ppid=3581 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.569000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 6 01:51:17.569000 audit: PATH item=0 name="/dev/fd/63" inode=30495 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.569000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.599000 audit[3634]: AVC avc: denied { write } for pid=3634 comm="tee" name="fd" dev="proc" ino=31067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.609000 audit[3630]: AVC avc: denied { write } for pid=3630 comm="tee" name="fd" dev="proc" ino=31068 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 6 01:51:17.609000 audit[3630]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffaaab47c1 a2=241 a3=1b6 items=1 ppid=3589 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.609000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 6 01:51:17.609000 audit: PATH item=0 name="/dev/fd/63" inode=31045 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.609000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.599000 audit[3634]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc163a7c1 a2=241 a3=1b6 items=1 ppid=3587 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:17.599000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 6 01:51:17.599000 audit: PATH item=0 name="/dev/fd/63" inode=31052 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 6 01:51:17.599000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 6 01:51:17.890000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:17.890000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022d31c0 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:51:17.890000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:51:17.891000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:17.891000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012ee360 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:51:17.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:51:18.140886 systemd-networkd[1027]: cali3b54244d304: Gained IPv6LL Sep 6 01:51:18.225000 audit[3678]: NETFILTER_CFG table=filter:103 family=2 entries=17 op=nft_register_rule pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:18.225000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe1f765860 a2=0 a3=7ffe1f76584c items=0 ppid=2097 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:18.233000 audit[3678]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:18.233000 audit[3678]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe1f765860 a2=0 a3=7ffe1f76584c items=0 ppid=2097 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.259000 audit: BPF prog-id=155 op=LOAD Sep 6 01:51:18.259000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffef9346c0 a2=98 a3=1fffffffffffffff items=0 ppid=3584 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.259000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:51:18.259000 audit: BPF prog-id=155 op=UNLOAD Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit: BPF prog-id=156 op=LOAD Sep 6 01:51:18.260000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffef9345a0 a2=94 a3=3 items=0 ppid=3584 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.260000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:51:18.260000 audit: BPF prog-id=156 op=UNLOAD Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit: BPF prog-id=157 op=LOAD Sep 6 01:51:18.260000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffef9345e0 a2=94 a3=7fffef9347c0 items=0 ppid=3584 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.260000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:51:18.260000 audit: BPF prog-id=157 op=UNLOAD Sep 6 01:51:18.260000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.260000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffef9346b0 a2=50 a3=a000000085 items=0 ppid=3584 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.260000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.264000 audit: BPF prog-id=158 op=LOAD Sep 6 01:51:18.264000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd9566ac0 a2=98 a3=3 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.264000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.266000 audit: BPF prog-id=158 op=UNLOAD Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.272000 audit: BPF prog-id=159 op=LOAD Sep 6 01:51:18.272000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd95668b0 a2=94 a3=54428f items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.272000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.274000 audit: BPF prog-id=159 op=UNLOAD Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.274000 audit: BPF prog-id=160 op=LOAD Sep 6 01:51:18.274000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd95668e0 a2=94 a3=2 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.274000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.275000 audit: BPF prog-id=160 op=UNLOAD Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.445000 audit: BPF prog-id=161 op=LOAD Sep 6 01:51:18.445000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd95667a0 a2=94 a3=1 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.445000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.446000 audit: BPF prog-id=161 op=UNLOAD Sep 6 01:51:18.446000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.446000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd9566870 a2=50 a3=7ffdd9566950 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.446000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.460000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.460000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd95667b0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.460000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.460000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.460000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd95667e0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.460000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.460000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.460000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd95666f0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.460000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd9566800 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd95667e0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd95667d0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd9566800 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd95667e0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd9566800 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd95667d0 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd9566840 a2=28 a3=0 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd95665f0 a2=50 a3=1 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit: BPF prog-id=162 op=LOAD Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd95665f0 a2=94 a3=5 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit: BPF prog-id=162 op=UNLOAD Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd95666a0 a2=50 a3=1 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdd95667c0 a2=4 a3=38 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.461000 audit[3694]: AVC avc: denied { confidentiality } for pid=3694 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:51:18.461000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd9566810 a2=94 a3=6 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { confidentiality } for pid=3694 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:51:18.462000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd9565fc0 a2=94 a3=88 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.462000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { perfmon } for pid=3694 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { bpf } for pid=3694 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.462000 audit[3694]: AVC avc: denied { confidentiality } for pid=3694 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:51:18.462000 audit[3694]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd9565fc0 a2=94 a3=88 items=0 ppid=3584 pid=3694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.462000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 6 01:51:18.461988 systemd-networkd[1027]: cali5c15f0e618b: Gained IPv6LL Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.561000 audit: BPF prog-id=163 op=LOAD Sep 6 01:51:18.561000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce3ada700 a2=98 a3=1999999999999999 items=0 ppid=3584 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.561000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:51:18.562000 audit: BPF prog-id=163 op=UNLOAD Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit: BPF prog-id=164 op=LOAD Sep 6 01:51:18.562000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce3ada5e0 a2=94 a3=ffff items=0 ppid=3584 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.562000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:51:18.562000 audit: BPF prog-id=164 op=UNLOAD Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.562000 audit: BPF prog-id=165 op=LOAD Sep 6 01:51:18.562000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce3ada620 a2=94 a3=7ffce3ada800 items=0 ppid=3584 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.562000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 6 01:51:18.562000 audit: BPF prog-id=165 op=UNLOAD Sep 6 01:51:18.734311 systemd-networkd[1027]: vxlan.calico: Link UP Sep 6 01:51:18.734323 systemd-networkd[1027]: vxlan.calico: Gained carrier Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.891000 audit: BPF prog-id=166 op=LOAD Sep 6 01:51:18.891000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffac03a610 a2=98 a3=20 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.891000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.891000 audit: BPF prog-id=166 op=UNLOAD Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit: BPF prog-id=167 op=LOAD Sep 6 01:51:18.893000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffac03a420 a2=94 a3=54428f items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.893000 audit: BPF prog-id=167 op=UNLOAD Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.893000 audit: BPF prog-id=168 op=LOAD Sep 6 01:51:18.893000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffac03a450 a2=94 a3=2 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit: BPF prog-id=168 op=UNLOAD Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac03a320 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac03a350 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac03a260 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac03a370 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac03a350 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac03a340 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac03a370 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac03a350 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac03a370 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffac03a340 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffac03a3b0 a2=28 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.894000 audit: BPF prog-id=169 op=LOAD Sep 6 01:51:18.894000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffac03a220 a2=94 a3=0 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.894000 audit: BPF prog-id=169 op=UNLOAD Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffac03a210 a2=50 a3=2800 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffac03a210 a2=50 a3=2800 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit: BPF prog-id=170 op=LOAD Sep 6 01:51:18.900000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffac039a30 a2=94 a3=2 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.900000 audit: BPF prog-id=170 op=UNLOAD Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.900000 audit: BPF prog-id=171 op=LOAD Sep 6 01:51:18.900000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffac039b30 a2=94 a3=30 items=0 ppid=3584 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.928000 audit: BPF prog-id=172 op=LOAD Sep 6 01:51:18.928000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd99ddda10 a2=98 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.928000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:18.928000 audit: BPF prog-id=172 op=UNLOAD Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.929000 audit: BPF prog-id=173 op=LOAD Sep 6 01:51:18.929000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd99ddd800 a2=94 a3=54428f items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:18.930000 audit: BPF prog-id=173 op=UNLOAD Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:18.930000 audit: BPF prog-id=174 op=LOAD Sep 6 01:51:18.930000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd99ddd830 a2=94 a3=2 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:18.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:18.931000 audit: BPF prog-id=174 op=UNLOAD Sep 6 01:51:19.261641 kernel: kauditd_printk_skb: 704 callbacks suppressed Sep 6 01:51:19.262749 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.281080 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.281326 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.289844 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.301072 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.301176 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308587 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.315403 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.315589 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 6 01:51:19.315669 kernel: audit: type=1400 audit(1757123479.254:1161): avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.254000 audit: BPF prog-id=175 op=LOAD Sep 6 01:51:19.254000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd99ddd6f0 a2=94 a3=1 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.254000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.278000 audit: BPF prog-id=175 op=UNLOAD Sep 6 01:51:19.278000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.278000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd99ddd7c0 a2=50 a3=7ffd99ddd8a0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd99ddd700 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd99ddd730 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd99ddd640 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd99ddd750 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd99ddd730 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd99ddd720 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd99ddd750 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd99ddd730 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd99ddd750 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd99ddd720 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd99ddd790 a2=28 a3=0 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd99ddd540 a2=50 a3=1 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.308000 audit: BPF prog-id=176 op=LOAD Sep 6 01:51:19.308000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd99ddd540 a2=94 a3=5 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.322000 audit: BPF prog-id=176 op=UNLOAD Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd99ddd5f0 a2=50 a3=1 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.322000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd99ddd710 a2=4 a3=38 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.322000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.322000 audit[3732]: AVC avc: denied { confidentiality } for pid=3732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:51:19.322000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd99ddd760 a2=94 a3=6 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.322000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { confidentiality } for pid=3732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:51:19.323000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd99ddcf10 a2=94 a3=88 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { confidentiality } for pid=3732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 6 01:51:19.323000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd99ddcf10 a2=94 a3=88 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd99dde940 a2=10 a3=f8f00800 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd99dde7e0 a2=10 a3=3 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.323000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.323000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd99dde780 a2=10 a3=3 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.323000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.327000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:19.327000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd99dde780 a2=10 a3=7 items=0 ppid=3584 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.327000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 6 01:51:19.338000 audit: BPF prog-id=171 op=UNLOAD Sep 6 01:51:19.686000 audit[3763]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=3763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:19.688000 audit[3766]: NETFILTER_CFG table=mangle:106 family=2 entries=16 op=nft_register_chain pid=3766 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:19.688000 audit[3766]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc57f9c6e0 a2=0 a3=7ffc57f9c6cc items=0 ppid=3584 pid=3766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:19.686000 audit[3763]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff7c1973d0 a2=0 a3=7fff7c1973bc items=0 ppid=3584 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.686000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:19.750000 audit[3768]: NETFILTER_CFG table=raw:107 family=2 entries=21 op=nft_register_chain pid=3768 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:19.750000 audit[3768]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc67f329c0 a2=0 a3=7ffc67f329ac items=0 ppid=3584 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:19.758000 audit[3770]: NETFILTER_CFG table=filter:108 family=2 entries=170 op=nft_register_chain pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:19.758000 audit[3770]: SYSCALL arch=c000003e syscall=46 success=yes exit=98076 a0=3 a1=7ffdea482e00 a2=0 a3=56306cba0000 items=0 ppid=3584 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:19.758000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:20.444731 systemd-networkd[1027]: vxlan.calico: Gained IPv6LL Sep 6 01:51:21.580000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:21.580000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d5b0240 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:51:21.580000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:51:21.581000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:21.581000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ef2f560 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:51:21.581000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:51:21.589000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526394 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:21.589000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d5b0270 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:51:21.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:51:21.590000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:21.590000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d5b02a0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:51:21.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:51:21.591000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:21.591000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ef2f580 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:51:21.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:51:21.595000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:21.595000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d5b0360 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:51:21.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:51:21.830553 env[1201]: time="2025-09-06T01:51:21.830312323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:21.834582 env[1201]: time="2025-09-06T01:51:21.834450514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:21.844195 env[1201]: time="2025-09-06T01:51:21.844108120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:21.847571 env[1201]: time="2025-09-06T01:51:21.847519080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:21.849551 env[1201]: time="2025-09-06T01:51:21.848677470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 6 01:51:21.857275 env[1201]: time="2025-09-06T01:51:21.857229808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 6 01:51:21.867863 env[1201]: time="2025-09-06T01:51:21.867811022Z" level=info msg="CreateContainer within sandbox \"ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 6 01:51:21.909795 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1890204059.mount: Deactivated successfully. Sep 6 01:51:21.915048 env[1201]: time="2025-09-06T01:51:21.914984853Z" level=info msg="CreateContainer within sandbox \"ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e501a0caf3a66dfc5c44a8f7e15a3f0e1ada7a81895773f53aa1bc36eb3f4fee\"" Sep 6 01:51:21.922979 env[1201]: time="2025-09-06T01:51:21.922605495Z" level=info msg="StartContainer for \"e501a0caf3a66dfc5c44a8f7e15a3f0e1ada7a81895773f53aa1bc36eb3f4fee\"" Sep 6 01:51:21.993381 systemd[1]: Started cri-containerd-e501a0caf3a66dfc5c44a8f7e15a3f0e1ada7a81895773f53aa1bc36eb3f4fee.scope. Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.045000 audit: BPF prog-id=177 op=LOAD Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3402 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535303161306361663361363664666335633434613866376531356133 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3402 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535303161306361663361363664666335633434613866376531356133 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit: BPF prog-id=178 op=LOAD Sep 6 01:51:22.048000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000392c50 items=0 ppid=3402 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535303161306361663361363664666335633434613866376531356133 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.048000 audit: BPF prog-id=179 op=LOAD Sep 6 01:51:22.048000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000392c98 items=0 ppid=3402 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:22.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535303161306361663361363664666335633434613866376531356133 Sep 6 01:51:22.051000 audit: BPF prog-id=179 op=UNLOAD Sep 6 01:51:22.051000 audit: BPF prog-id=178 op=UNLOAD Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:22.052000 audit: BPF prog-id=180 op=LOAD Sep 6 01:51:22.052000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003930a8 items=0 ppid=3402 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:22.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535303161306361663361363664666335633434613866376531356133 Sep 6 01:51:22.160704 env[1201]: time="2025-09-06T01:51:22.160576931Z" level=info msg="StartContainer for \"e501a0caf3a66dfc5c44a8f7e15a3f0e1ada7a81895773f53aa1bc36eb3f4fee\" returns successfully" Sep 6 01:51:22.899198 systemd[1]: run-containerd-runc-k8s.io-e501a0caf3a66dfc5c44a8f7e15a3f0e1ada7a81895773f53aa1bc36eb3f4fee-runc.RR2j7t.mount: Deactivated successfully. Sep 6 01:51:23.187454 kubelet[1976]: I0906 01:51:23.183895 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7dc7b8776b-4749k" podStartSLOduration=35.099622979 podStartE2EDuration="40.183806017s" podCreationTimestamp="2025-09-06 01:50:43 +0000 UTC" firstStartedPulling="2025-09-06 01:51:16.770552522 +0000 UTC m=+51.193172296" lastFinishedPulling="2025-09-06 01:51:21.854735567 +0000 UTC m=+56.277355334" observedRunningTime="2025-09-06 01:51:23.182127813 +0000 UTC m=+57.604747594" watchObservedRunningTime="2025-09-06 01:51:23.183806017 +0000 UTC m=+57.606425791" Sep 6 01:51:23.220000 audit[3818]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:23.220000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe9c9873c0 a2=0 a3=7ffe9c9873ac items=0 ppid=2097 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:23.226000 audit[3818]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:23.226000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe9c9873c0 a2=0 a3=7ffe9c9873ac items=0 ppid=2097 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:23.650063 env[1201]: time="2025-09-06T01:51:23.649988218Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:23.656259 env[1201]: time="2025-09-06T01:51:23.652418774Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:23.659440 env[1201]: time="2025-09-06T01:51:23.659384800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:23.663011 env[1201]: time="2025-09-06T01:51:23.662957018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:23.663659 env[1201]: time="2025-09-06T01:51:23.663621416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 6 01:51:23.668065 env[1201]: time="2025-09-06T01:51:23.668021222Z" level=info msg="CreateContainer within sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 6 01:51:23.690317 env[1201]: time="2025-09-06T01:51:23.690226617Z" level=info msg="CreateContainer within sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\"" Sep 6 01:51:23.691722 env[1201]: time="2025-09-06T01:51:23.691677368Z" level=info msg="StartContainer for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\"" Sep 6 01:51:23.742321 systemd[1]: Started cri-containerd-fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3.scope. Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.810000 audit: BPF prog-id=181 op=LOAD Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3482 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643936643664663030636561333331343262316465326437393639 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3482 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643936643664663030636561333331343262316465326437393639 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit: BPF prog-id=182 op=LOAD Sep 6 01:51:23.812000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032ff00 items=0 ppid=3482 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643936643664663030636561333331343262316465326437393639 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit: BPF prog-id=183 op=LOAD Sep 6 01:51:23.812000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032ff48 items=0 ppid=3482 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643936643664663030636561333331343262316465326437393639 Sep 6 01:51:23.812000 audit: BPF prog-id=183 op=UNLOAD Sep 6 01:51:23.812000 audit: BPF prog-id=182 op=UNLOAD Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { perfmon } for pid=3826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit[3826]: AVC avc: denied { bpf } for pid=3826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:23.812000 audit: BPF prog-id=184 op=LOAD Sep 6 01:51:23.812000 audit[3826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000396358 items=0 ppid=3482 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643936643664663030636561333331343262316465326437393639 Sep 6 01:51:23.867330 env[1201]: time="2025-09-06T01:51:23.867256858Z" level=info msg="StartContainer for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" returns successfully" Sep 6 01:51:23.871191 env[1201]: time="2025-09-06T01:51:23.871157107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 6 01:51:23.899559 systemd[1]: run-containerd-runc-k8s.io-fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3-runc.YokWtD.mount: Deactivated successfully. Sep 6 01:51:23.902000 audit[3836]: AVC avc: denied { search } for pid=3836 comm="nginx" name="crypto" dev="proc" ino=31519 scontext=system_u:system_r:svirt_lxc_net_t:s0:c897,c951 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:51:23.902000 audit[3836]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f646edd6728 a2=0 a3=0 items=0 ppid=3482 pid=3836 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c897,c951 key=(null) Sep 6 01:51:23.902000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 6 01:51:24.021000 audit[3796]: AVC avc: denied { watch } for pid=3796 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_51_00.322866223/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c940 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c940 tclass=file permissive=0 Sep 6 01:51:24.021000 audit[3796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aeef20 a2=fc6 a3=0 items=0 ppid=3402 pid=3796 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c940 key=(null) Sep 6 01:51:24.021000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:51:24.165881 kubelet[1976]: I0906 01:51:24.165712 1976 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:51:25.954048 env[1201]: time="2025-09-06T01:51:25.953817009Z" level=info msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" Sep 6 01:51:26.048430 env[1201]: time="2025-09-06T01:51:26.047448930Z" level=info msg="StopPodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\"" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.308 [INFO][3874] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.308 [INFO][3874] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" iface="eth0" netns="/var/run/netns/cni-75683ed7-7a2f-21ad-7b20-9121a7859547" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.310 [INFO][3874] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" iface="eth0" netns="/var/run/netns/cni-75683ed7-7a2f-21ad-7b20-9121a7859547" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.310 [INFO][3874] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" iface="eth0" netns="/var/run/netns/cni-75683ed7-7a2f-21ad-7b20-9121a7859547" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.310 [INFO][3874] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.310 [INFO][3874] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.443 [INFO][3897] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.447 [INFO][3897] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.447 [INFO][3897] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.459 [WARNING][3897] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.459 [INFO][3897] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.462 [INFO][3897] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:26.480736 env[1201]: 2025-09-06 01:51:26.476 [INFO][3874] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:51:26.510150 env[1201]: time="2025-09-06T01:51:26.485569397Z" level=info msg="TearDown network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" successfully" Sep 6 01:51:26.510150 env[1201]: time="2025-09-06T01:51:26.485652778Z" level=info msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" returns successfully" Sep 6 01:51:26.510150 env[1201]: time="2025-09-06T01:51:26.491185628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5tx9n,Uid:00b78940-5f73-4204-96b1-330a29fc1d16,Namespace:kube-system,Attempt:1,}" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.291 [WARNING][3886] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a1e32e33-a785-4580-ae5b-d0382082341d", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b", Pod:"coredns-668d6bf9bc-42nvm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3b54244d304", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.295 [INFO][3886] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.295 [INFO][3886] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" iface="eth0" netns="" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.295 [INFO][3886] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.296 [INFO][3886] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.447 [INFO][3895] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.447 [INFO][3895] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.462 [INFO][3895] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.476 [WARNING][3895] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.476 [INFO][3895] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.488 [INFO][3895] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:26.510150 env[1201]: 2025-09-06 01:51:26.492 [INFO][3886] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.510150 env[1201]: time="2025-09-06T01:51:26.495864915Z" level=info msg="TearDown network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" successfully" Sep 6 01:51:26.510150 env[1201]: time="2025-09-06T01:51:26.495902238Z" level=info msg="StopPodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" returns successfully" Sep 6 01:51:26.485067 systemd[1]: run-netns-cni\x2d75683ed7\x2d7a2f\x2d21ad\x2d7b20\x2d9121a7859547.mount: Deactivated successfully. Sep 6 01:51:26.530950 env[1201]: time="2025-09-06T01:51:26.530885876Z" level=info msg="RemovePodSandbox for \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\"" Sep 6 01:51:26.531189 env[1201]: time="2025-09-06T01:51:26.530951932Z" level=info msg="Forcibly stopping sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\"" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.634 [WARNING][3925] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a1e32e33-a785-4580-ae5b-d0382082341d", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"d2e60a815751368ea915cda4ded92c6f9a2425f5f76d89d4f41de635b6b56d7b", Pod:"coredns-668d6bf9bc-42nvm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3b54244d304", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.634 [INFO][3925] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.634 [INFO][3925] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" iface="eth0" netns="" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.634 [INFO][3925] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.634 [INFO][3925] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.675 [INFO][3941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.675 [INFO][3941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.675 [INFO][3941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.685 [WARNING][3941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.685 [INFO][3941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" HandleID="k8s-pod-network.859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--42nvm-eth0" Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.695 [INFO][3941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:26.706589 env[1201]: 2025-09-06 01:51:26.700 [INFO][3925] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b" Sep 6 01:51:26.706589 env[1201]: time="2025-09-06T01:51:26.706028149Z" level=info msg="TearDown network for sandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" successfully" Sep 6 01:51:26.714377 env[1201]: time="2025-09-06T01:51:26.714307972Z" level=info msg="RemovePodSandbox \"859d0259415e33a6aad8d1bb353a00adb1b7f0c3028a30cd2486898010dcf16b\" returns successfully" Sep 6 01:51:26.720197 env[1201]: time="2025-09-06T01:51:26.720059165Z" level=info msg="StopPodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\"" Sep 6 01:51:26.781834 systemd-networkd[1027]: cali6eb2990dd4c: Link UP Sep 6 01:51:26.794555 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:51:26.798507 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6eb2990dd4c: link becomes ready Sep 6 01:51:26.802638 systemd-networkd[1027]: cali6eb2990dd4c: Gained carrier Sep 6 01:51:26.809434 env[1201]: time="2025-09-06T01:51:26.809386111Z" level=info msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.609 [INFO][3912] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0 coredns-668d6bf9bc- kube-system 00b78940-5f73-4204-96b1-330a29fc1d16 988 0 2025-09-06 01:50:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com coredns-668d6bf9bc-5tx9n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6eb2990dd4c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.610 [INFO][3912] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.687 [INFO][3935] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" HandleID="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.687 [INFO][3935] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" HandleID="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a25d0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-5tx9n", "timestamp":"2025-09-06 01:51:26.684397154 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.687 [INFO][3935] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.696 [INFO][3935] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.696 [INFO][3935] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.715 [INFO][3935] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.726 [INFO][3935] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.736 [INFO][3935] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.739 [INFO][3935] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.743 [INFO][3935] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.743 [INFO][3935] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.745 [INFO][3935] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.751 [INFO][3935] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.770 [INFO][3935] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.132/26] block=192.168.83.128/26 handle="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.770 [INFO][3935] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.132/26] handle="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.770 [INFO][3935] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:26.851338 env[1201]: 2025-09-06 01:51:26.770 [INFO][3935] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.132/26] IPv6=[] ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" HandleID="k8s-pod-network.2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.856284 env[1201]: 2025-09-06 01:51:26.773 [INFO][3912] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"00b78940-5f73-4204-96b1-330a29fc1d16", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-5tx9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6eb2990dd4c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:26.856284 env[1201]: 2025-09-06 01:51:26.773 [INFO][3912] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.132/32] ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.856284 env[1201]: 2025-09-06 01:51:26.773 [INFO][3912] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6eb2990dd4c ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.856284 env[1201]: 2025-09-06 01:51:26.806 [INFO][3912] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.856284 env[1201]: 2025-09-06 01:51:26.808 [INFO][3912] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"00b78940-5f73-4204-96b1-330a29fc1d16", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da", Pod:"coredns-668d6bf9bc-5tx9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6eb2990dd4c", MAC:"02:8c:9b:a7:08:28", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:26.856284 env[1201]: 2025-09-06 01:51:26.843 [INFO][3912] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da" Namespace="kube-system" Pod="coredns-668d6bf9bc-5tx9n" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:51:26.883000 audit[3975]: NETFILTER_CFG table=filter:111 family=2 entries=40 op=nft_register_chain pid=3975 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:26.885708 kernel: kauditd_printk_skb: 271 callbacks suppressed Sep 6 01:51:26.885828 kernel: audit: type=1325 audit(1757123486.883:1238): table=filter:111 family=2 entries=40 op=nft_register_chain pid=3975 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:26.893182 kernel: audit: type=1300 audit(1757123486.883:1238): arch=c000003e syscall=46 success=yes exit=20344 a0=3 a1=7ffd0f1c57a0 a2=0 a3=7ffd0f1c578c items=0 ppid=3584 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:26.883000 audit[3975]: SYSCALL arch=c000003e syscall=46 success=yes exit=20344 a0=3 a1=7ffd0f1c57a0 a2=0 a3=7ffd0f1c578c items=0 ppid=3584 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:26.883000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:26.911511 kernel: audit: type=1327 audit(1757123486.883:1238): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:26.982880 env[1201]: time="2025-09-06T01:51:26.982736550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:26.982880 env[1201]: time="2025-09-06T01:51:26.982841295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:26.983769 env[1201]: time="2025-09-06T01:51:26.983709721Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:26.984267 env[1201]: time="2025-09-06T01:51:26.984161367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da pid=4004 runtime=io.containerd.runc.v2 Sep 6 01:51:27.023871 systemd[1]: Started cri-containerd-2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da.scope. Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.121253 kernel: audit: type=1400 audit(1757123487.096:1239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.121393 kernel: audit: type=1400 audit(1757123487.096:1240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:26.938 [WARNING][3958] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0", GenerateName:"whisker-6c65c9557f-", Namespace:"calico-system", SelfLink:"", UID:"87323d63-715c-4f88-bbb8-886336ab6529", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c65c9557f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af", Pod:"whisker-6c65c9557f-zhn44", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.83.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali5c15f0e618b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:26.939 [INFO][3958] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:26.939 [INFO][3958] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" iface="eth0" netns="" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:26.939 [INFO][3958] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:26.940 [INFO][3958] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.056 [INFO][3993] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.058 [INFO][3993] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.058 [INFO][3993] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.069 [WARNING][3993] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.069 [INFO][3993] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.085 [INFO][3993] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:27.121615 env[1201]: 2025-09-06 01:51:27.093 [INFO][3958] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.124943 env[1201]: time="2025-09-06T01:51:27.121721399Z" level=info msg="TearDown network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" successfully" Sep 6 01:51:27.124943 env[1201]: time="2025-09-06T01:51:27.121765330Z" level=info msg="StopPodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" returns successfully" Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.126228 env[1201]: time="2025-09-06T01:51:27.125324319Z" level=info msg="RemovePodSandbox for \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\"" Sep 6 01:51:27.126679 env[1201]: time="2025-09-06T01:51:27.126398606Z" level=info msg="Forcibly stopping sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\"" Sep 6 01:51:27.132165 kernel: audit: type=1400 audit(1757123487.096:1241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.132340 kernel: audit: type=1400 audit(1757123487.096:1242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.141359 kernel: audit: type=1400 audit(1757123487.096:1243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.153205 kernel: audit: type=1400 audit(1757123487.096:1244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.153294 kernel: audit: type=1400 audit(1757123487.096:1245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.101000 audit: BPF prog-id=185 op=LOAD Sep 6 01:51:27.127000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.127000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4004 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264323039303061323031306431383064613366656531333665366264 Sep 6 01:51:27.127000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.127000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4004 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264323039303061323031306431383064613366656531333665366264 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.128000 audit: BPF prog-id=186 op=LOAD Sep 6 01:51:27.128000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=4004 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264323039303061323031306431383064613366656531333665366264 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.135000 audit: BPF prog-id=187 op=LOAD Sep 6 01:51:27.135000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=4004 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264323039303061323031306431383064613366656531333665366264 Sep 6 01:51:27.135000 audit: BPF prog-id=187 op=UNLOAD Sep 6 01:51:27.137000 audit: BPF prog-id=186 op=UNLOAD Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.137000 audit: BPF prog-id=188 op=LOAD Sep 6 01:51:27.137000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=4004 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264323039303061323031306431383064613366656531333665366264 Sep 6 01:51:27.271582 env[1201]: time="2025-09-06T01:51:27.271520349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5tx9n,Uid:00b78940-5f73-4204-96b1-330a29fc1d16,Namespace:kube-system,Attempt:1,} returns sandbox id \"2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da\"" Sep 6 01:51:27.286753 env[1201]: time="2025-09-06T01:51:27.286568427Z" level=info msg="CreateContainer within sandbox \"2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 6 01:51:27.308193 env[1201]: time="2025-09-06T01:51:27.308063202Z" level=info msg="CreateContainer within sandbox \"2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"62682a8a7184b689173b5b07dd5b012fb1b55480d387797dbd249bce93ec7c3a\"" Sep 6 01:51:27.311976 env[1201]: time="2025-09-06T01:51:27.311214900Z" level=info msg="StartContainer for \"62682a8a7184b689173b5b07dd5b012fb1b55480d387797dbd249bce93ec7c3a\"" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.178 [INFO][3994] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.178 [INFO][3994] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" iface="eth0" netns="/var/run/netns/cni-3d5fb2e4-b80f-afb8-15f9-8770334d5f3c" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.178 [INFO][3994] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" iface="eth0" netns="/var/run/netns/cni-3d5fb2e4-b80f-afb8-15f9-8770334d5f3c" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.179 [INFO][3994] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" iface="eth0" netns="/var/run/netns/cni-3d5fb2e4-b80f-afb8-15f9-8770334d5f3c" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.179 [INFO][3994] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.179 [INFO][3994] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.291 [INFO][4040] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.291 [INFO][4040] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.291 [INFO][4040] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.318 [WARNING][4040] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.318 [INFO][4040] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.320 [INFO][4040] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:27.338054 env[1201]: 2025-09-06 01:51:27.332 [INFO][3994] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:51:27.340649 env[1201]: time="2025-09-06T01:51:27.340570267Z" level=info msg="TearDown network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" successfully" Sep 6 01:51:27.341077 env[1201]: time="2025-09-06T01:51:27.340802004Z" level=info msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" returns successfully" Sep 6 01:51:27.344828 env[1201]: time="2025-09-06T01:51:27.344789515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hx2m2,Uid:68bbc274-4386-44c8-80ff-be25dc03e0e0,Namespace:calico-system,Attempt:1,}" Sep 6 01:51:27.469592 systemd[1]: Started cri-containerd-62682a8a7184b689173b5b07dd5b012fb1b55480d387797dbd249bce93ec7c3a.scope. Sep 6 01:51:27.487167 systemd[1]: run-netns-cni\x2d3d5fb2e4\x2db80f\x2dafb8\x2d15f9\x2d8770334d5f3c.mount: Deactivated successfully. Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.339 [WARNING][4049] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0", GenerateName:"whisker-6c65c9557f-", Namespace:"calico-system", SelfLink:"", UID:"87323d63-715c-4f88-bbb8-886336ab6529", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c65c9557f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af", Pod:"whisker-6c65c9557f-zhn44", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.83.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali5c15f0e618b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.340 [INFO][4049] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.340 [INFO][4049] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" iface="eth0" netns="" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.340 [INFO][4049] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.340 [INFO][4049] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.463 [INFO][4072] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.465 [INFO][4072] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.465 [INFO][4072] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.504 [WARNING][4072] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.504 [INFO][4072] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" HandleID="k8s-pod-network.233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.509 [INFO][4072] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:27.518556 env[1201]: 2025-09-06 01:51:27.512 [INFO][4049] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc" Sep 6 01:51:27.518556 env[1201]: time="2025-09-06T01:51:27.518016262Z" level=info msg="TearDown network for sandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" successfully" Sep 6 01:51:27.523391 env[1201]: time="2025-09-06T01:51:27.523332559Z" level=info msg="RemovePodSandbox \"233471eab9f40a11723fe1e80dcf771c697276329894d7fc213b7edcc18ec8fc\" returns successfully" Sep 6 01:51:27.524572 env[1201]: time="2025-09-06T01:51:27.524101290Z" level=info msg="StopPodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\"" Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.528000 audit: BPF prog-id=189 op=LOAD Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4004 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363832613861373138346236383931373362356230376464356230 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4004 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363832613861373138346236383931373362356230376464356230 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.530000 audit: BPF prog-id=190 op=LOAD Sep 6 01:51:27.530000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000963a0 items=0 ppid=4004 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363832613861373138346236383931373362356230376464356230 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit: BPF prog-id=191 op=LOAD Sep 6 01:51:27.531000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000963e8 items=0 ppid=4004 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363832613861373138346236383931373362356230376464356230 Sep 6 01:51:27.531000 audit: BPF prog-id=191 op=UNLOAD Sep 6 01:51:27.531000 audit: BPF prog-id=190 op=UNLOAD Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:27.531000 audit: BPF prog-id=192 op=LOAD Sep 6 01:51:27.531000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000967f8 items=0 ppid=4004 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:27.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632363832613861373138346236383931373362356230376464356230 Sep 6 01:51:27.603859 env[1201]: time="2025-09-06T01:51:27.603671259Z" level=info msg="StartContainer for \"62682a8a7184b689173b5b07dd5b012fb1b55480d387797dbd249bce93ec7c3a\" returns successfully" Sep 6 01:51:27.742000 audit[4101]: AVC avc: denied { getattr } for pid=4101 comm="coredns" path="cgroup:[4026532883]" dev="nsfs" ino=4026532883 scontext=system_u:system_r:svirt_lxc_net_t:s0:c549,c896 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 6 01:51:27.742000 audit[4101]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0004c29f8 a3=0 items=0 ppid=4004 pid=4101 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c549,c896 key=(null) Sep 6 01:51:27.742000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 6 01:51:27.798116 systemd-networkd[1027]: calidec51bfb716: Link UP Sep 6 01:51:27.817557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:51:27.817752 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidec51bfb716: link becomes ready Sep 6 01:51:27.815675 systemd-networkd[1027]: calidec51bfb716: Gained carrier Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.557 [INFO][4080] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0 csi-node-driver- calico-system 68bbc274-4386-44c8-80ff-be25dc03e0e0 995 0 2025-09-06 01:50:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com csi-node-driver-hx2m2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calidec51bfb716 [] [] }} ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.558 [INFO][4080] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.707 [INFO][4123] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" HandleID="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.713 [INFO][4123] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" HandleID="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f5c0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"csi-node-driver-hx2m2", "timestamp":"2025-09-06 01:51:27.707932271 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.713 [INFO][4123] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.713 [INFO][4123] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.713 [INFO][4123] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.728 [INFO][4123] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.741 [INFO][4123] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.751 [INFO][4123] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.754 [INFO][4123] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.762 [INFO][4123] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.762 [INFO][4123] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.766 [INFO][4123] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413 Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.778 [INFO][4123] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.789 [INFO][4123] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.133/26] block=192.168.83.128/26 handle="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.789 [INFO][4123] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.133/26] handle="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.789 [INFO][4123] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:27.895212 env[1201]: 2025-09-06 01:51:27.790 [INFO][4123] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.133/26] IPv6=[] ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" HandleID="k8s-pod-network.a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.896573 env[1201]: 2025-09-06 01:51:27.792 [INFO][4080] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bbc274-4386-44c8-80ff-be25dc03e0e0", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-hx2m2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidec51bfb716", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:27.896573 env[1201]: 2025-09-06 01:51:27.792 [INFO][4080] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.133/32] ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.896573 env[1201]: 2025-09-06 01:51:27.792 [INFO][4080] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidec51bfb716 ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.896573 env[1201]: 2025-09-06 01:51:27.814 [INFO][4080] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.896573 env[1201]: 2025-09-06 01:51:27.814 [INFO][4080] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bbc274-4386-44c8-80ff-be25dc03e0e0", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413", Pod:"csi-node-driver-hx2m2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidec51bfb716", MAC:"da:a1:cf:0d:b6:31", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:27.896573 env[1201]: 2025-09-06 01:51:27.887 [INFO][4080] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413" Namespace="calico-system" Pod="csi-node-driver-hx2m2" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:51:27.910843 env[1201]: time="2025-09-06T01:51:27.910784364Z" level=info msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" Sep 6 01:51:27.921457 env[1201]: time="2025-09-06T01:51:27.921408619Z" level=info msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.679 [WARNING][4118] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8303c83-3056-43e0-b522-817a0f1904bf", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794", Pod:"calico-apiserver-7dc7b8776b-4749k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali216460029a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.680 [INFO][4118] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.680 [INFO][4118] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" iface="eth0" netns="" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.680 [INFO][4118] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.680 [INFO][4118] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.854 [INFO][4142] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.856 [INFO][4142] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.856 [INFO][4142] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.884 [WARNING][4142] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.885 [INFO][4142] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.890 [INFO][4142] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:27.952483 env[1201]: 2025-09-06 01:51:27.912 [INFO][4118] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:27.952483 env[1201]: time="2025-09-06T01:51:27.952007163Z" level=info msg="TearDown network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" successfully" Sep 6 01:51:27.952483 env[1201]: time="2025-09-06T01:51:27.952065294Z" level=info msg="StopPodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" returns successfully" Sep 6 01:51:27.953462 env[1201]: time="2025-09-06T01:51:27.953136148Z" level=info msg="RemovePodSandbox for \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\"" Sep 6 01:51:27.953462 env[1201]: time="2025-09-06T01:51:27.953184442Z" level=info msg="Forcibly stopping sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\"" Sep 6 01:51:28.093213 env[1201]: time="2025-09-06T01:51:28.092416186Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:28.093213 env[1201]: time="2025-09-06T01:51:28.092539696Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:28.093213 env[1201]: time="2025-09-06T01:51:28.092559460Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:28.108020 env[1201]: time="2025-09-06T01:51:28.097319983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413 pid=4195 runtime=io.containerd.runc.v2 Sep 6 01:51:28.267000 systemd[1]: Started cri-containerd-a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413.scope. Sep 6 01:51:28.282308 systemd[1]: run-containerd-runc-k8s.io-a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413-runc.qFOTKR.mount: Deactivated successfully. Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.452000 audit: BPF prog-id=193 op=LOAD Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4195 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623665633136663161626138643334666537643965323237643230 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4195 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623665633136663161626138643334666537643965323237643230 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit: BPF prog-id=194 op=LOAD Sep 6 01:51:28.453000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000308820 items=0 ppid=4195 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623665633136663161626138643334666537643965323237643230 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit: BPF prog-id=195 op=LOAD Sep 6 01:51:28.453000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308868 items=0 ppid=4195 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623665633136663161626138643334666537643965323237643230 Sep 6 01:51:28.453000 audit: BPF prog-id=195 op=UNLOAD Sep 6 01:51:28.453000 audit: BPF prog-id=194 op=UNLOAD Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { perfmon } for pid=4216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit[4216]: AVC avc: denied { bpf } for pid=4216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:28.453000 audit: BPF prog-id=196 op=LOAD Sep 6 01:51:28.453000 audit[4216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308c78 items=0 ppid=4195 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623665633136663161626138643334666537643965323237643230 Sep 6 01:51:28.525430 env[1201]: time="2025-09-06T01:51:28.472956720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hx2m2,Uid:68bbc274-4386-44c8-80ff-be25dc03e0e0,Namespace:calico-system,Attempt:1,} returns sandbox id \"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413\"" Sep 6 01:51:28.508757 systemd-networkd[1027]: cali6eb2990dd4c: Gained IPv6LL Sep 6 01:51:28.647000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:28.647000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0027f42c0 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:51:28.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:51:28.661000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:28.661000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8400 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:51:28.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:51:28.661000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:28.661000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000ef8480 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:51:28.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:51:28.662000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:51:28.662000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027f4640 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:51:28.662000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:51:28.675524 kubelet[1976]: I0906 01:51:28.656778 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-5tx9n" podStartSLOduration=58.640927574 podStartE2EDuration="58.640927574s" podCreationTimestamp="2025-09-06 01:50:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:51:28.593299372 +0000 UTC m=+63.015919158" watchObservedRunningTime="2025-09-06 01:51:28.640927574 +0000 UTC m=+63.063547341" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.319 [WARNING][4194] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8303c83-3056-43e0-b522-817a0f1904bf", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"ef520cee00a4f6259cbdc39e70029c7e96698570b12e6662bf67b4370bda2794", Pod:"calico-apiserver-7dc7b8776b-4749k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali216460029a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.320 [INFO][4194] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.320 [INFO][4194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" iface="eth0" netns="" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.320 [INFO][4194] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.320 [INFO][4194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.642 [INFO][4232] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.645 [INFO][4232] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.645 [INFO][4232] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.680 [WARNING][4232] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.680 [INFO][4232] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" HandleID="k8s-pod-network.9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--4749k-eth0" Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.695 [INFO][4232] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:28.704105 env[1201]: 2025-09-06 01:51:28.699 [INFO][4194] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34" Sep 6 01:51:28.707905 env[1201]: time="2025-09-06T01:51:28.704079651Z" level=info msg="TearDown network for sandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" successfully" Sep 6 01:51:28.714222 env[1201]: time="2025-09-06T01:51:28.714179066Z" level=info msg="RemovePodSandbox \"9bd1434eda56e88febbb5dc850c03ebe1c191f2d11a004589a291ee8561dae34\" returns successfully" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.308 [INFO][4191] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.309 [INFO][4191] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" iface="eth0" netns="/var/run/netns/cni-b318d41e-c376-691b-bef0-4b09001e480f" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.310 [INFO][4191] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" iface="eth0" netns="/var/run/netns/cni-b318d41e-c376-691b-bef0-4b09001e480f" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.311 [INFO][4191] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" iface="eth0" netns="/var/run/netns/cni-b318d41e-c376-691b-bef0-4b09001e480f" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.315 [INFO][4191] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.315 [INFO][4191] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.717 [INFO][4234] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.717 [INFO][4234] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.717 [INFO][4234] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.758 [WARNING][4234] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.758 [INFO][4234] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.760 [INFO][4234] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:28.767740 env[1201]: 2025-09-06 01:51:28.765 [INFO][4191] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:51:28.782053 env[1201]: time="2025-09-06T01:51:28.771778799Z" level=info msg="TearDown network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" successfully" Sep 6 01:51:28.782053 env[1201]: time="2025-09-06T01:51:28.771826368Z" level=info msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" returns successfully" Sep 6 01:51:28.782053 env[1201]: time="2025-09-06T01:51:28.781910398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-6ngzs,Uid:79b17d51-205b-45ba-9310-076cced172a7,Namespace:calico-system,Attempt:1,}" Sep 6 01:51:28.771619 systemd[1]: run-netns-cni\x2db318d41e\x2dc376\x2d691b\x2dbef0\x2d4b09001e480f.mount: Deactivated successfully. Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.585 [INFO][4190] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.586 [INFO][4190] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" iface="eth0" netns="/var/run/netns/cni-74987086-5534-b423-9b19-eadf57062cbb" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.586 [INFO][4190] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" iface="eth0" netns="/var/run/netns/cni-74987086-5534-b423-9b19-eadf57062cbb" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.586 [INFO][4190] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" iface="eth0" netns="/var/run/netns/cni-74987086-5534-b423-9b19-eadf57062cbb" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.587 [INFO][4190] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.587 [INFO][4190] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.755 [INFO][4259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.755 [INFO][4259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.760 [INFO][4259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.782 [WARNING][4259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.782 [INFO][4259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.785 [INFO][4259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:28.797017 env[1201]: 2025-09-06 01:51:28.791 [INFO][4190] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:51:28.801150 systemd[1]: run-netns-cni\x2d74987086\x2d5534\x2db423\x2d9b19\x2deadf57062cbb.mount: Deactivated successfully. Sep 6 01:51:28.819146 env[1201]: time="2025-09-06T01:51:28.819096555Z" level=info msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" Sep 6 01:51:28.819950 env[1201]: time="2025-09-06T01:51:28.819905933Z" level=info msg="TearDown network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" successfully" Sep 6 01:51:28.820444 env[1201]: time="2025-09-06T01:51:28.820078153Z" level=info msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" returns successfully" Sep 6 01:51:28.836244 env[1201]: time="2025-09-06T01:51:28.836185127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-798f59b8c7-m4nnq,Uid:7a0bb70b-816e-46fb-960c-13508504a78b,Namespace:calico-system,Attempt:1,}" Sep 6 01:51:28.835000 audit[4273]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:28.835000 audit[4273]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff3758b240 a2=0 a3=7fff3758b22c items=0 ppid=2097 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:28.852000 audit[4275]: NETFILTER_CFG table=filter:113 family=2 entries=48 op=nft_register_chain pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:28.852000 audit[4275]: SYSCALL arch=c000003e syscall=46 success=yes exit=23140 a0=3 a1=7fff8336ef90 a2=0 a3=7fff8336ef7c items=0 ppid=3584 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.852000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:28.889000 audit[4273]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:28.889000 audit[4273]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff3758b240 a2=0 a3=7fff3758b22c items=0 ppid=2097 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.889000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:28.960000 audit[4311]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:28.960000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc5089a620 a2=0 a3=7ffc5089a60c items=0 ppid=2097 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:28.968000 audit[4311]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:28.968000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc5089a620 a2=0 a3=7ffc5089a60c items=0 ppid=2097 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:28.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:29.177790 systemd-networkd[1027]: calicacf0a8e342: Link UP Sep 6 01:51:29.180732 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:51:29.180885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicacf0a8e342: link becomes ready Sep 6 01:51:29.182507 systemd-networkd[1027]: calicacf0a8e342: Gained carrier Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:28.948 [INFO][4276] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0 goldmane-54d579b49d- calico-system 79b17d51-205b-45ba-9310-076cced172a7 1006 0 2025-09-06 01:50:46 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:54d579b49d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com goldmane-54d579b49d-6ngzs eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calicacf0a8e342 [] [] }} ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:28.949 [INFO][4276] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.091 [INFO][4314] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" HandleID="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.093 [INFO][4314] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" HandleID="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000285cd0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"goldmane-54d579b49d-6ngzs", "timestamp":"2025-09-06 01:51:29.091185932 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.096 [INFO][4314] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.097 [INFO][4314] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.097 [INFO][4314] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.117 [INFO][4314] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.124 [INFO][4314] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.133 [INFO][4314] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.137 [INFO][4314] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.140 [INFO][4314] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.140 [INFO][4314] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.143 [INFO][4314] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.149 [INFO][4314] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.159 [INFO][4314] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.134/26] block=192.168.83.128/26 handle="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.159 [INFO][4314] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.134/26] handle="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.159 [INFO][4314] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:29.223534 env[1201]: 2025-09-06 01:51:29.159 [INFO][4314] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.134/26] IPv6=[] ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" HandleID="k8s-pod-network.6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.226255 env[1201]: 2025-09-06 01:51:29.163 [INFO][4276] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"79b17d51-205b-45ba-9310-076cced172a7", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-54d579b49d-6ngzs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.83.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicacf0a8e342", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:29.226255 env[1201]: 2025-09-06 01:51:29.163 [INFO][4276] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.134/32] ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.226255 env[1201]: 2025-09-06 01:51:29.163 [INFO][4276] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicacf0a8e342 ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.226255 env[1201]: 2025-09-06 01:51:29.183 [INFO][4276] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.226255 env[1201]: 2025-09-06 01:51:29.195 [INFO][4276] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"79b17d51-205b-45ba-9310-076cced172a7", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d", Pod:"goldmane-54d579b49d-6ngzs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.83.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicacf0a8e342", MAC:"7e:f0:fa:21:b2:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:29.226255 env[1201]: 2025-09-06 01:51:29.214 [INFO][4276] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d" Namespace="calico-system" Pod="goldmane-54d579b49d-6ngzs" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:51:29.274000 audit[4347]: NETFILTER_CFG table=filter:117 family=2 entries=60 op=nft_register_chain pid=4347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:29.274000 audit[4347]: SYSCALL arch=c000003e syscall=46 success=yes exit=29932 a0=3 a1=7ffd32616f50 a2=0 a3=7ffd32616f3c items=0 ppid=3584 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.274000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:29.314684 env[1201]: time="2025-09-06T01:51:29.313374669Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:29.314684 env[1201]: time="2025-09-06T01:51:29.313432322Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:29.314684 env[1201]: time="2025-09-06T01:51:29.313448619Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:29.314684 env[1201]: time="2025-09-06T01:51:29.313688540Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d pid=4355 runtime=io.containerd.runc.v2 Sep 6 01:51:29.319812 systemd-networkd[1027]: cali7c07aff7a9c: Link UP Sep 6 01:51:29.334520 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c07aff7a9c: link becomes ready Sep 6 01:51:29.333886 systemd-networkd[1027]: cali7c07aff7a9c: Gained carrier Sep 6 01:51:29.342923 systemd-networkd[1027]: calidec51bfb716: Gained IPv6LL Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.048 [INFO][4294] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.048 [INFO][4294] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" iface="eth0" netns="/var/run/netns/cni-07ff25a5-2ad3-f093-98d5-03500b6a1d7d" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.048 [INFO][4294] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" iface="eth0" netns="/var/run/netns/cni-07ff25a5-2ad3-f093-98d5-03500b6a1d7d" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.054 [INFO][4294] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" iface="eth0" netns="/var/run/netns/cni-07ff25a5-2ad3-f093-98d5-03500b6a1d7d" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.055 [INFO][4294] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.055 [INFO][4294] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.240 [INFO][4325] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.242 [INFO][4325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.298 [INFO][4325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.335 [WARNING][4325] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.335 [INFO][4325] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.349 [INFO][4325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:29.370362 env[1201]: 2025-09-06 01:51:29.361 [INFO][4294] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:51:29.371697 env[1201]: time="2025-09-06T01:51:29.371654360Z" level=info msg="TearDown network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" successfully" Sep 6 01:51:29.371827 env[1201]: time="2025-09-06T01:51:29.371794670Z" level=info msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" returns successfully" Sep 6 01:51:29.373791 env[1201]: time="2025-09-06T01:51:29.373754550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-m7mdj,Uid:04532c76-6801-4489-bbb9-c2be04557e1b,Namespace:calico-apiserver,Attempt:1,}" Sep 6 01:51:29.418912 systemd[1]: Started cri-containerd-6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d.scope. Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.029 [INFO][4300] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0 calico-kube-controllers-798f59b8c7- calico-system 7a0bb70b-816e-46fb-960c-13508504a78b 1008 0 2025-09-06 01:50:47 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:798f59b8c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com calico-kube-controllers-798f59b8c7-m4nnq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7c07aff7a9c [] [] }} ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.029 [INFO][4300] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.229 [INFO][4323] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" HandleID="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.231 [INFO][4323] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" HandleID="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024aa00), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"calico-kube-controllers-798f59b8c7-m4nnq", "timestamp":"2025-09-06 01:51:29.229345489 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.231 [INFO][4323] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.231 [INFO][4323] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.232 [INFO][4323] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.247 [INFO][4323] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.255 [INFO][4323] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.261 [INFO][4323] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.268 [INFO][4323] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.274 [INFO][4323] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.274 [INFO][4323] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.276 [INFO][4323] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.283 [INFO][4323] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.298 [INFO][4323] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.135/26] block=192.168.83.128/26 handle="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.298 [INFO][4323] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.135/26] handle="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.298 [INFO][4323] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:29.436772 env[1201]: 2025-09-06 01:51:29.298 [INFO][4323] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.135/26] IPv6=[] ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" HandleID="k8s-pod-network.30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.438356 env[1201]: 2025-09-06 01:51:29.302 [INFO][4300] cni-plugin/k8s.go 418: Populated endpoint ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0", GenerateName:"calico-kube-controllers-798f59b8c7-", Namespace:"calico-system", SelfLink:"", UID:"7a0bb70b-816e-46fb-960c-13508504a78b", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"798f59b8c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-798f59b8c7-m4nnq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c07aff7a9c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:29.438356 env[1201]: 2025-09-06 01:51:29.302 [INFO][4300] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.135/32] ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.438356 env[1201]: 2025-09-06 01:51:29.303 [INFO][4300] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7c07aff7a9c ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.438356 env[1201]: 2025-09-06 01:51:29.360 [INFO][4300] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.438356 env[1201]: 2025-09-06 01:51:29.360 [INFO][4300] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0", GenerateName:"calico-kube-controllers-798f59b8c7-", Namespace:"calico-system", SelfLink:"", UID:"7a0bb70b-816e-46fb-960c-13508504a78b", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"798f59b8c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c", Pod:"calico-kube-controllers-798f59b8c7-m4nnq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c07aff7a9c", MAC:"9a:28:83:b0:3a:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:29.438356 env[1201]: 2025-09-06 01:51:29.393 [INFO][4300] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c" Namespace="calico-system" Pod="calico-kube-controllers-798f59b8c7-m4nnq" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:51:29.463000 audit[4391]: NETFILTER_CFG table=filter:118 family=2 entries=56 op=nft_register_chain pid=4391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:29.463000 audit[4391]: SYSCALL arch=c000003e syscall=46 success=yes exit=25516 a0=3 a1=7ffeb2ac8eb0 a2=0 a3=7ffeb2ac8e9c items=0 ppid=3584 pid=4391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.463000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.481000 audit: BPF prog-id=197 op=LOAD Sep 6 01:51:29.486000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.486000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4355 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396338636135653332386363636233393235623334326637356438 Sep 6 01:51:29.486000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.486000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4355 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396338636135653332386363636233393235623334326637356438 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit: BPF prog-id=198 op=LOAD Sep 6 01:51:29.487000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f9f50 items=0 ppid=4355 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396338636135653332386363636233393235623334326637356438 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit: BPF prog-id=199 op=LOAD Sep 6 01:51:29.487000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f9f98 items=0 ppid=4355 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396338636135653332386363636233393235623334326637356438 Sep 6 01:51:29.487000 audit: BPF prog-id=199 op=UNLOAD Sep 6 01:51:29.487000 audit: BPF prog-id=198 op=UNLOAD Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.487000 audit: BPF prog-id=200 op=LOAD Sep 6 01:51:29.487000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f03a8 items=0 ppid=4355 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396338636135653332386363636233393235623334326637356438 Sep 6 01:51:29.529165 env[1201]: time="2025-09-06T01:51:29.529046750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:29.529464 env[1201]: time="2025-09-06T01:51:29.529134018Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:29.529636 env[1201]: time="2025-09-06T01:51:29.529446180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:29.531158 env[1201]: time="2025-09-06T01:51:29.531083861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c pid=4404 runtime=io.containerd.runc.v2 Sep 6 01:51:29.564260 systemd[1]: run-netns-cni\x2d07ff25a5\x2d2ad3\x2df093\x2d98d5\x2d03500b6a1d7d.mount: Deactivated successfully. Sep 6 01:51:29.577924 systemd[1]: Started cri-containerd-30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c.scope. Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.651000 audit: BPF prog-id=201 op=LOAD Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4404 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393632653231653962623361303231613866653566306235646138 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4404 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393632653231653962623361303231613866653566306235646138 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.653000 audit: BPF prog-id=202 op=LOAD Sep 6 01:51:29.653000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002a1590 items=0 ppid=4404 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393632653231653962623361303231613866653566306235646138 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit: BPF prog-id=203 op=LOAD Sep 6 01:51:29.655000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002a15d8 items=0 ppid=4404 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393632653231653962623361303231613866653566306235646138 Sep 6 01:51:29.655000 audit: BPF prog-id=203 op=UNLOAD Sep 6 01:51:29.655000 audit: BPF prog-id=202 op=UNLOAD Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:29.655000 audit: BPF prog-id=204 op=LOAD Sep 6 01:51:29.655000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002a19e8 items=0 ppid=4404 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393632653231653962623361303231613866653566306235646138 Sep 6 01:51:29.674531 env[1201]: time="2025-09-06T01:51:29.674443832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-6ngzs,Uid:79b17d51-205b-45ba-9310-076cced172a7,Namespace:calico-system,Attempt:1,} returns sandbox id \"6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d\"" Sep 6 01:51:29.754009 env[1201]: time="2025-09-06T01:51:29.753872258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-798f59b8c7-m4nnq,Uid:7a0bb70b-816e-46fb-960c-13508504a78b,Namespace:calico-system,Attempt:1,} returns sandbox id \"30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c\"" Sep 6 01:51:29.890248 systemd-networkd[1027]: cali06aa67aa1c4: Link UP Sep 6 01:51:29.905601 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali06aa67aa1c4: link becomes ready Sep 6 01:51:29.908118 systemd-networkd[1027]: cali06aa67aa1c4: Gained carrier Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.738 [INFO][4388] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0 calico-apiserver-7dc7b8776b- calico-apiserver 04532c76-6801-4489-bbb9-c2be04557e1b 1019 0 2025-09-06 01:50:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dc7b8776b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com calico-apiserver-7dc7b8776b-m7mdj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali06aa67aa1c4 [] [] }} ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.738 [INFO][4388] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.814 [INFO][4453] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" HandleID="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.818 [INFO][4453] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" HandleID="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032a1a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-lvab0.gb1.brightbox.com", "pod":"calico-apiserver-7dc7b8776b-m7mdj", "timestamp":"2025-09-06 01:51:29.814184273 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.818 [INFO][4453] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.818 [INFO][4453] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.818 [INFO][4453] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.830 [INFO][4453] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.837 [INFO][4453] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.848 [INFO][4453] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.851 [INFO][4453] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.855 [INFO][4453] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.855 [INFO][4453] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.857 [INFO][4453] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3 Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.863 [INFO][4453] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.872 [INFO][4453] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.136/26] block=192.168.83.128/26 handle="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.872 [INFO][4453] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.136/26] handle="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.873 [INFO][4453] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:29.943276 env[1201]: 2025-09-06 01:51:29.873 [INFO][4453] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.136/26] IPv6=[] ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" HandleID="k8s-pod-network.62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.946721 env[1201]: 2025-09-06 01:51:29.881 [INFO][4388] cni-plugin/k8s.go 418: Populated endpoint ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"04532c76-6801-4489-bbb9-c2be04557e1b", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-7dc7b8776b-m7mdj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06aa67aa1c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:29.946721 env[1201]: 2025-09-06 01:51:29.881 [INFO][4388] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.136/32] ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.946721 env[1201]: 2025-09-06 01:51:29.882 [INFO][4388] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali06aa67aa1c4 ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.946721 env[1201]: 2025-09-06 01:51:29.909 [INFO][4388] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.946721 env[1201]: 2025-09-06 01:51:29.911 [INFO][4388] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"04532c76-6801-4489-bbb9-c2be04557e1b", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3", Pod:"calico-apiserver-7dc7b8776b-m7mdj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06aa67aa1c4", MAC:"4e:aa:42:8b:f3:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:29.946721 env[1201]: 2025-09-06 01:51:29.937 [INFO][4388] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3" Namespace="calico-apiserver" Pod="calico-apiserver-7dc7b8776b-m7mdj" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:51:29.981000 audit[4478]: NETFILTER_CFG table=filter:119 family=2 entries=61 op=nft_register_chain pid=4478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:29.981000 audit[4478]: SYSCALL arch=c000003e syscall=46 success=yes exit=29016 a0=3 a1=7ffdf1bd7330 a2=0 a3=7ffdf1bd731c items=0 ppid=3584 pid=4478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:29.981000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:29.994801 env[1201]: time="2025-09-06T01:51:29.994482533Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:29.994801 env[1201]: time="2025-09-06T01:51:29.994569414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:29.994801 env[1201]: time="2025-09-06T01:51:29.994588114Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:29.995109 env[1201]: time="2025-09-06T01:51:29.994867924Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3 pid=4477 runtime=io.containerd.runc.v2 Sep 6 01:51:30.043569 systemd[1]: Started cri-containerd-62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3.scope. Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.079000 audit: BPF prog-id=205 op=LOAD Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632633935346365323562323935356535653933316434333765613361 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632633935346365323562323935356535653933316434333765613361 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit: BPF prog-id=206 op=LOAD Sep 6 01:51:30.080000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ea1a0 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632633935346365323562323935356535653933316434333765613361 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit: BPF prog-id=207 op=LOAD Sep 6 01:51:30.080000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ea1e8 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632633935346365323562323935356535653933316434333765613361 Sep 6 01:51:30.080000 audit: BPF prog-id=207 op=UNLOAD Sep 6 01:51:30.080000 audit: BPF prog-id=206 op=UNLOAD Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.080000 audit: BPF prog-id=208 op=LOAD Sep 6 01:51:30.080000 audit[4487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ea5f8 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632633935346365323562323935356535653933316434333765613361 Sep 6 01:51:30.139172 env[1201]: time="2025-09-06T01:51:30.138926132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dc7b8776b-m7mdj,Uid:04532c76-6801-4489-bbb9-c2be04557e1b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3\"" Sep 6 01:51:30.168030 env[1201]: time="2025-09-06T01:51:30.167873260Z" level=info msg="CreateContainer within sandbox \"62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 6 01:51:30.187126 env[1201]: time="2025-09-06T01:51:30.186650682Z" level=info msg="CreateContainer within sandbox \"62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8e643385d360e676c6254d6d450e495f389afe822c902576f1217a9ebacefaa4\"" Sep 6 01:51:30.191172 env[1201]: time="2025-09-06T01:51:30.191135749Z" level=info msg="StartContainer for \"8e643385d360e676c6254d6d450e495f389afe822c902576f1217a9ebacefaa4\"" Sep 6 01:51:30.233384 systemd[1]: Started cri-containerd-8e643385d360e676c6254d6d450e495f389afe822c902576f1217a9ebacefaa4.scope. Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.260000 audit: BPF prog-id=209 op=LOAD Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4477 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865363433333835643336306536373663363235346436643435306534 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4477 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865363433333835643336306536373663363235346436643435306534 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.262000 audit: BPF prog-id=210 op=LOAD Sep 6 01:51:30.262000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a4f30 items=0 ppid=4477 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865363433333835643336306536373663363235346436643435306534 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit: BPF prog-id=211 op=LOAD Sep 6 01:51:30.263000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a4f78 items=0 ppid=4477 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865363433333835643336306536373663363235346436643435306534 Sep 6 01:51:30.263000 audit: BPF prog-id=211 op=UNLOAD Sep 6 01:51:30.263000 audit: BPF prog-id=210 op=UNLOAD Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:30.263000 audit: BPF prog-id=212 op=LOAD Sep 6 01:51:30.263000 audit[4519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a5388 items=0 ppid=4477 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865363433333835643336306536373663363235346436643435306534 Sep 6 01:51:30.320416 env[1201]: time="2025-09-06T01:51:30.320260979Z" level=info msg="StartContainer for \"8e643385d360e676c6254d6d450e495f389afe822c902576f1217a9ebacefaa4\" returns successfully" Sep 6 01:51:30.415332 kubelet[1976]: I0906 01:51:30.413896 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7dc7b8776b-m7mdj" podStartSLOduration=47.413845992 podStartE2EDuration="47.413845992s" podCreationTimestamp="2025-09-06 01:50:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:51:30.41366118 +0000 UTC m=+64.836280961" watchObservedRunningTime="2025-09-06 01:51:30.413845992 +0000 UTC m=+64.836465781" Sep 6 01:51:30.445000 audit[4548]: NETFILTER_CFG table=filter:120 family=2 entries=14 op=nft_register_rule pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:30.445000 audit[4548]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffddd1715a0 a2=0 a3=7ffddd17158c items=0 ppid=2097 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:30.449000 audit[4548]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:30.449000 audit[4548]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffddd1715a0 a2=0 a3=7ffddd17158c items=0 ppid=2097 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:30.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:30.559607 systemd[1]: run-containerd-runc-k8s.io-62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3-runc.JycPcr.mount: Deactivated successfully. Sep 6 01:51:30.934078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1115059059.mount: Deactivated successfully. Sep 6 01:51:30.966696 env[1201]: time="2025-09-06T01:51:30.966639531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:30.972117 env[1201]: time="2025-09-06T01:51:30.972067727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:30.973882 env[1201]: time="2025-09-06T01:51:30.973845220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:30.976636 env[1201]: time="2025-09-06T01:51:30.976579354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:30.977654 env[1201]: time="2025-09-06T01:51:30.977615081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 6 01:51:30.998429 env[1201]: time="2025-09-06T01:51:30.998342221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 6 01:51:31.000195 env[1201]: time="2025-09-06T01:51:31.000153680Z" level=info msg="CreateContainer within sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 6 01:51:31.022094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1767989297.mount: Deactivated successfully. Sep 6 01:51:31.024216 env[1201]: time="2025-09-06T01:51:31.024020318Z" level=info msg="CreateContainer within sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\"" Sep 6 01:51:31.027164 env[1201]: time="2025-09-06T01:51:31.027112014Z" level=info msg="StartContainer for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\"" Sep 6 01:51:31.079250 systemd[1]: Started cri-containerd-876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623.scope. Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.115000 audit: BPF prog-id=213 op=LOAD Sep 6 01:51:31.117000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.117000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3482 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363030333833306561333933623935343930373530396663356239 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3482 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363030333833306561333933623935343930373530396663356239 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.118000 audit: BPF prog-id=214 op=LOAD Sep 6 01:51:31.118000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000372fc0 items=0 ppid=3482 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363030333833306561333933623935343930373530396663356239 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.120000 audit: BPF prog-id=215 op=LOAD Sep 6 01:51:31.120000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000373008 items=0 ppid=3482 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363030333833306561333933623935343930373530396663356239 Sep 6 01:51:31.120000 audit: BPF prog-id=215 op=UNLOAD Sep 6 01:51:31.121000 audit: BPF prog-id=214 op=UNLOAD Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:31.121000 audit: BPF prog-id=216 op=LOAD Sep 6 01:51:31.121000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000373418 items=0 ppid=3482 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837363030333833306561333933623935343930373530396663356239 Sep 6 01:51:31.180276 env[1201]: time="2025-09-06T01:51:31.180209407Z" level=info msg="StartContainer for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" returns successfully" Sep 6 01:51:31.198540 systemd-networkd[1027]: calicacf0a8e342: Gained IPv6LL Sep 6 01:51:31.325752 systemd-networkd[1027]: cali7c07aff7a9c: Gained IPv6LL Sep 6 01:51:31.420529 env[1201]: time="2025-09-06T01:51:31.418705201Z" level=info msg="StopContainer for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" with timeout 30 (s)" Sep 6 01:51:31.422131 env[1201]: time="2025-09-06T01:51:31.422085587Z" level=info msg="Stop container \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" with signal terminated" Sep 6 01:51:31.423674 env[1201]: time="2025-09-06T01:51:31.423605058Z" level=info msg="StopContainer for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" with timeout 30 (s)" Sep 6 01:51:31.425286 env[1201]: time="2025-09-06T01:51:31.425251296Z" level=info msg="Stop container \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" with signal terminated" Sep 6 01:51:31.444438 kubelet[1976]: I0906 01:51:31.444327 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-6c65c9557f-zhn44" podStartSLOduration=27.373402982 podStartE2EDuration="41.444251266s" podCreationTimestamp="2025-09-06 01:50:50 +0000 UTC" firstStartedPulling="2025-09-06 01:51:16.92072272 +0000 UTC m=+51.343342498" lastFinishedPulling="2025-09-06 01:51:30.991570983 +0000 UTC m=+65.414190782" observedRunningTime="2025-09-06 01:51:31.443085916 +0000 UTC m=+65.865705701" watchObservedRunningTime="2025-09-06 01:51:31.444251266 +0000 UTC m=+65.866871043" Sep 6 01:51:31.445853 systemd[1]: cri-containerd-876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623.scope: Deactivated successfully. Sep 6 01:51:31.445000 audit: BPF prog-id=213 op=UNLOAD Sep 6 01:51:31.448000 audit: BPF prog-id=216 op=UNLOAD Sep 6 01:51:31.506280 systemd[1]: cri-containerd-fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3.scope: Deactivated successfully. Sep 6 01:51:31.506000 audit: BPF prog-id=181 op=UNLOAD Sep 6 01:51:31.509000 audit: BPF prog-id=184 op=UNLOAD Sep 6 01:51:31.516389 env[1201]: time="2025-09-06T01:51:31.516313015Z" level=info msg="shim disconnected" id=876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623 Sep 6 01:51:31.517004 env[1201]: time="2025-09-06T01:51:31.516964202Z" level=warning msg="cleaning up after shim disconnected" id=876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623 namespace=k8s.io Sep 6 01:51:31.517157 env[1201]: time="2025-09-06T01:51:31.517126988Z" level=info msg="cleaning up dead shim" Sep 6 01:51:31.536000 audit[4638]: NETFILTER_CFG table=filter:122 family=2 entries=13 op=nft_register_rule pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:31.536000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd7a1b2b30 a2=0 a3=7ffd7a1b2b1c items=0 ppid=2097 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:31.543080 env[1201]: time="2025-09-06T01:51:31.543031220Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:51:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4624 runtime=io.containerd.runc.v2\n" Sep 6 01:51:31.545283 env[1201]: time="2025-09-06T01:51:31.545243107Z" level=info msg="StopContainer for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" returns successfully" Sep 6 01:51:31.545000 audit[4638]: NETFILTER_CFG table=nat:123 family=2 entries=27 op=nft_register_chain pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:31.545000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd7a1b2b30 a2=0 a3=7ffd7a1b2b1c items=0 ppid=2097 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:31.558582 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623-rootfs.mount: Deactivated successfully. Sep 6 01:51:31.566161 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3-rootfs.mount: Deactivated successfully. Sep 6 01:51:31.573136 env[1201]: time="2025-09-06T01:51:31.573073186Z" level=info msg="shim disconnected" id=fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3 Sep 6 01:51:31.573432 env[1201]: time="2025-09-06T01:51:31.573399087Z" level=warning msg="cleaning up after shim disconnected" id=fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3 namespace=k8s.io Sep 6 01:51:31.573627 env[1201]: time="2025-09-06T01:51:31.573598172Z" level=info msg="cleaning up dead shim" Sep 6 01:51:31.589173 env[1201]: time="2025-09-06T01:51:31.589132604Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:51:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4649 runtime=io.containerd.runc.v2\n" Sep 6 01:51:31.591434 env[1201]: time="2025-09-06T01:51:31.591395149Z" level=info msg="StopContainer for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" returns successfully" Sep 6 01:51:31.592442 env[1201]: time="2025-09-06T01:51:31.592373497Z" level=info msg="StopPodSandbox for \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\"" Sep 6 01:51:31.592612 env[1201]: time="2025-09-06T01:51:31.592575968Z" level=info msg="Container to stop \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 6 01:51:31.592696 env[1201]: time="2025-09-06T01:51:31.592612396Z" level=info msg="Container to stop \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 6 01:51:31.596285 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af-shm.mount: Deactivated successfully. Sep 6 01:51:31.608315 systemd[1]: cri-containerd-0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af.scope: Deactivated successfully. Sep 6 01:51:31.608000 audit: BPF prog-id=147 op=UNLOAD Sep 6 01:51:31.612000 audit: BPF prog-id=150 op=UNLOAD Sep 6 01:51:31.644127 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af-rootfs.mount: Deactivated successfully. Sep 6 01:51:31.644677 systemd-networkd[1027]: cali06aa67aa1c4: Gained IPv6LL Sep 6 01:51:31.650187 env[1201]: time="2025-09-06T01:51:31.650135767Z" level=info msg="shim disconnected" id=0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af Sep 6 01:51:31.651099 env[1201]: time="2025-09-06T01:51:31.651067678Z" level=warning msg="cleaning up after shim disconnected" id=0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af namespace=k8s.io Sep 6 01:51:31.651297 env[1201]: time="2025-09-06T01:51:31.651268910Z" level=info msg="cleaning up dead shim" Sep 6 01:51:31.667919 env[1201]: time="2025-09-06T01:51:31.667864573Z" level=warning msg="cleanup warnings time=\"2025-09-06T01:51:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4680 runtime=io.containerd.runc.v2\n" Sep 6 01:51:31.749656 systemd-networkd[1027]: cali5c15f0e618b: Link DOWN Sep 6 01:51:31.749667 systemd-networkd[1027]: cali5c15f0e618b: Lost carrier Sep 6 01:51:31.845000 audit[4721]: NETFILTER_CFG table=filter:124 family=2 entries=75 op=nft_register_rule pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:31.845000 audit[4721]: SYSCALL arch=c000003e syscall=46 success=yes exit=10420 a0=3 a1=7ffed76043c0 a2=0 a3=7ffed76043ac items=0 ppid=3584 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.845000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:31.846000 audit[4721]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_unregister_chain pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:31.846000 audit[4721]: SYSCALL arch=c000003e syscall=46 success=yes exit=880 a0=3 a1=7ffed76043c0 a2=0 a3=557aa52ad000 items=0 ppid=3584 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:31.846000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.741 [INFO][4703] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.742 [INFO][4703] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" iface="eth0" netns="/var/run/netns/cni-6edb0751-ccd2-e7f5-c946-a8c8432f16da" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.748 [INFO][4703] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" iface="eth0" netns="/var/run/netns/cni-6edb0751-ccd2-e7f5-c946-a8c8432f16da" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.764 [INFO][4703] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" after=21.749565ms iface="eth0" netns="/var/run/netns/cni-6edb0751-ccd2-e7f5-c946-a8c8432f16da" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.764 [INFO][4703] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.764 [INFO][4703] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.815 [INFO][4711] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.815 [INFO][4711] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.816 [INFO][4711] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.922 [INFO][4711] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.922 [INFO][4711] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.926 [INFO][4711] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:31.934286 env[1201]: 2025-09-06 01:51:31.928 [INFO][4703] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:51:31.938450 systemd[1]: run-netns-cni\x2d6edb0751\x2dccd2\x2de7f5\x2dc946\x2da8c8432f16da.mount: Deactivated successfully. Sep 6 01:51:31.940306 env[1201]: time="2025-09-06T01:51:31.940236789Z" level=info msg="TearDown network for sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" successfully" Sep 6 01:51:31.940459 env[1201]: time="2025-09-06T01:51:31.940415017Z" level=info msg="StopPodSandbox for \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" returns successfully" Sep 6 01:51:32.021339 kernel: kauditd_printk_skb: 512 callbacks suppressed Sep 6 01:51:32.022548 kernel: audit: type=1325 audit(1757123492.010:1408): table=filter:126 family=2 entries=13 op=nft_register_rule pid=4725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:32.010000 audit[4725]: NETFILTER_CFG table=filter:126 family=2 entries=13 op=nft_register_rule pid=4725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:32.010000 audit[4725]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd29526840 a2=0 a3=7ffd2952682c items=0 ppid=2097 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:32.031767 kernel: audit: type=1300 audit(1757123492.010:1408): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd29526840 a2=0 a3=7ffd2952682c items=0 ppid=2097 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:32.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:32.032000 audit[4725]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_unregister_chain pid=4725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:32.040600 kernel: audit: type=1327 audit(1757123492.010:1408): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:32.040718 kernel: audit: type=1325 audit(1757123492.032:1409): table=nat:127 family=2 entries=27 op=nft_unregister_chain pid=4725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:32.040768 kernel: audit: type=1300 audit(1757123492.032:1409): arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffd29526840 a2=0 a3=7ffd2952682c items=0 ppid=2097 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:32.032000 audit[4725]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffd29526840 a2=0 a3=7ffd2952682c items=0 ppid=2097 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:32.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:32.052508 kernel: audit: type=1327 audit(1757123492.032:1409): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:32.070121 kubelet[1976]: I0906 01:51:32.070041 1976 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/87323d63-715c-4f88-bbb8-886336ab6529-whisker-backend-key-pair\") pod \"87323d63-715c-4f88-bbb8-886336ab6529\" (UID: \"87323d63-715c-4f88-bbb8-886336ab6529\") " Sep 6 01:51:32.070516 kubelet[1976]: I0906 01:51:32.070158 1976 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87323d63-715c-4f88-bbb8-886336ab6529-whisker-ca-bundle\") pod \"87323d63-715c-4f88-bbb8-886336ab6529\" (UID: \"87323d63-715c-4f88-bbb8-886336ab6529\") " Sep 6 01:51:32.070516 kubelet[1976]: I0906 01:51:32.070224 1976 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wqh85\" (UniqueName: \"kubernetes.io/projected/87323d63-715c-4f88-bbb8-886336ab6529-kube-api-access-wqh85\") pod \"87323d63-715c-4f88-bbb8-886336ab6529\" (UID: \"87323d63-715c-4f88-bbb8-886336ab6529\") " Sep 6 01:51:32.091437 kubelet[1976]: I0906 01:51:32.088033 1976 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/87323d63-715c-4f88-bbb8-886336ab6529-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "87323d63-715c-4f88-bbb8-886336ab6529" (UID: "87323d63-715c-4f88-bbb8-886336ab6529"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Sep 6 01:51:32.123833 kubelet[1976]: I0906 01:51:32.123698 1976 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/87323d63-715c-4f88-bbb8-886336ab6529-kube-api-access-wqh85" (OuterVolumeSpecName: "kube-api-access-wqh85") pod "87323d63-715c-4f88-bbb8-886336ab6529" (UID: "87323d63-715c-4f88-bbb8-886336ab6529"). InnerVolumeSpecName "kube-api-access-wqh85". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 6 01:51:32.127387 kubelet[1976]: I0906 01:51:32.127338 1976 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/87323d63-715c-4f88-bbb8-886336ab6529-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "87323d63-715c-4f88-bbb8-886336ab6529" (UID: "87323d63-715c-4f88-bbb8-886336ab6529"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 6 01:51:32.174123 kubelet[1976]: I0906 01:51:32.174064 1976 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/87323d63-715c-4f88-bbb8-886336ab6529-whisker-backend-key-pair\") on node \"srv-lvab0.gb1.brightbox.com\" DevicePath \"\"" Sep 6 01:51:32.174335 kubelet[1976]: I0906 01:51:32.174122 1976 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87323d63-715c-4f88-bbb8-886336ab6529-whisker-ca-bundle\") on node \"srv-lvab0.gb1.brightbox.com\" DevicePath \"\"" Sep 6 01:51:32.174335 kubelet[1976]: I0906 01:51:32.174156 1976 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-wqh85\" (UniqueName: \"kubernetes.io/projected/87323d63-715c-4f88-bbb8-886336ab6529-kube-api-access-wqh85\") on node \"srv-lvab0.gb1.brightbox.com\" DevicePath \"\"" Sep 6 01:51:32.447074 kubelet[1976]: I0906 01:51:32.447037 1976 scope.go:117] "RemoveContainer" containerID="876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623" Sep 6 01:51:32.493230 env[1201]: time="2025-09-06T01:51:32.492712662Z" level=info msg="RemoveContainer for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\"" Sep 6 01:51:32.500239 env[1201]: time="2025-09-06T01:51:32.500145426Z" level=info msg="RemoveContainer for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" returns successfully" Sep 6 01:51:32.506726 kubelet[1976]: I0906 01:51:32.506575 1976 scope.go:117] "RemoveContainer" containerID="fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3" Sep 6 01:51:32.508694 systemd[1]: Removed slice kubepods-besteffort-pod87323d63_715c_4f88_bbb8_886336ab6529.slice. Sep 6 01:51:32.515054 env[1201]: time="2025-09-06T01:51:32.515009953Z" level=info msg="RemoveContainer for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\"" Sep 6 01:51:32.519161 env[1201]: time="2025-09-06T01:51:32.519112388Z" level=info msg="RemoveContainer for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" returns successfully" Sep 6 01:51:32.522395 kubelet[1976]: I0906 01:51:32.522360 1976 scope.go:117] "RemoveContainer" containerID="876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623" Sep 6 01:51:32.522977 env[1201]: time="2025-09-06T01:51:32.522771946Z" level=error msg="ContainerStatus for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": not found" Sep 6 01:51:32.523446 kubelet[1976]: E0906 01:51:32.523363 1976 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": not found" containerID="876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623" Sep 6 01:51:32.527909 kubelet[1976]: I0906 01:51:32.527636 1976 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623"} err="failed to get container status \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": rpc error: code = NotFound desc = an error occurred when try to find container \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": not found" Sep 6 01:51:32.527909 kubelet[1976]: I0906 01:51:32.527731 1976 scope.go:117] "RemoveContainer" containerID="fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3" Sep 6 01:51:32.528334 env[1201]: time="2025-09-06T01:51:32.528272349Z" level=error msg="ContainerStatus for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": not found" Sep 6 01:51:32.537360 kubelet[1976]: E0906 01:51:32.536281 1976 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": not found" containerID="fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3" Sep 6 01:51:32.537360 kubelet[1976]: I0906 01:51:32.536367 1976 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3"} err="failed to get container status \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": rpc error: code = NotFound desc = an error occurred when try to find container \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": not found" Sep 6 01:51:32.537360 kubelet[1976]: I0906 01:51:32.536400 1976 scope.go:117] "RemoveContainer" containerID="876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623" Sep 6 01:51:32.538156 env[1201]: time="2025-09-06T01:51:32.538074908Z" level=error msg="ContainerStatus for \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": not found" Sep 6 01:51:32.538550 kubelet[1976]: I0906 01:51:32.538504 1976 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623"} err="failed to get container status \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": rpc error: code = NotFound desc = an error occurred when try to find container \"876003830ea393b954907509fc5b9b63c283ad51b670856a00efbcdc5f45f623\": not found" Sep 6 01:51:32.538658 kubelet[1976]: I0906 01:51:32.538550 1976 scope.go:117] "RemoveContainer" containerID="fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3" Sep 6 01:51:32.539000 env[1201]: time="2025-09-06T01:51:32.538934692Z" level=error msg="ContainerStatus for \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": not found" Sep 6 01:51:32.539295 kubelet[1976]: I0906 01:51:32.539254 1976 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3"} err="failed to get container status \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": rpc error: code = NotFound desc = an error occurred when try to find container \"fed96d6df00cea33142b1de2d796934de9eeb258f4561ba0078f9a285df804a3\": not found" Sep 6 01:51:32.558669 systemd[1]: var-lib-kubelet-pods-87323d63\x2d715c\x2d4f88\x2dbbb8\x2d886336ab6529-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwqh85.mount: Deactivated successfully. Sep 6 01:51:32.559257 systemd[1]: var-lib-kubelet-pods-87323d63\x2d715c\x2d4f88\x2dbbb8\x2d886336ab6529-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 6 01:51:32.930397 kubelet[1976]: I0906 01:51:32.930256 1976 memory_manager.go:355] "RemoveStaleState removing state" podUID="87323d63-715c-4f88-bbb8-886336ab6529" containerName="whisker" Sep 6 01:51:32.930397 kubelet[1976]: I0906 01:51:32.930326 1976 memory_manager.go:355] "RemoveStaleState removing state" podUID="87323d63-715c-4f88-bbb8-886336ab6529" containerName="whisker-backend" Sep 6 01:51:32.938783 env[1201]: time="2025-09-06T01:51:32.938721839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:32.942119 env[1201]: time="2025-09-06T01:51:32.942079876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:32.978353 env[1201]: time="2025-09-06T01:51:32.978292109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:32.982303 env[1201]: time="2025-09-06T01:51:32.982267717Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:32.983158 env[1201]: time="2025-09-06T01:51:32.983076167Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 6 01:51:32.989929 systemd[1]: Created slice kubepods-besteffort-pod31c99817_cfcb_40a2_a8dd_943d6c53ba65.slice. Sep 6 01:51:32.991375 kubelet[1976]: I0906 01:51:32.991341 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/31c99817-cfcb-40a2-a8dd-943d6c53ba65-whisker-ca-bundle\") pod \"whisker-7b9999d478-rzpr5\" (UID: \"31c99817-cfcb-40a2-a8dd-943d6c53ba65\") " pod="calico-system/whisker-7b9999d478-rzpr5" Sep 6 01:51:32.991721 kubelet[1976]: I0906 01:51:32.991676 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/31c99817-cfcb-40a2-a8dd-943d6c53ba65-whisker-backend-key-pair\") pod \"whisker-7b9999d478-rzpr5\" (UID: \"31c99817-cfcb-40a2-a8dd-943d6c53ba65\") " pod="calico-system/whisker-7b9999d478-rzpr5" Sep 6 01:51:32.991891 kubelet[1976]: I0906 01:51:32.991861 1976 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4gf95\" (UniqueName: \"kubernetes.io/projected/31c99817-cfcb-40a2-a8dd-943d6c53ba65-kube-api-access-4gf95\") pod \"whisker-7b9999d478-rzpr5\" (UID: \"31c99817-cfcb-40a2-a8dd-943d6c53ba65\") " pod="calico-system/whisker-7b9999d478-rzpr5" Sep 6 01:51:32.994591 env[1201]: time="2025-09-06T01:51:32.994545173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 6 01:51:33.001722 env[1201]: time="2025-09-06T01:51:33.001678324Z" level=info msg="CreateContainer within sandbox \"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 6 01:51:33.039203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4024258762.mount: Deactivated successfully. Sep 6 01:51:33.050320 env[1201]: time="2025-09-06T01:51:33.050149255Z" level=info msg="CreateContainer within sandbox \"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"10f48cd7068ee8ab0aa90a71770ab3b69adc88c98fde6ed879a35ed6b591ccc8\"" Sep 6 01:51:33.056261 env[1201]: time="2025-09-06T01:51:33.051381924Z" level=info msg="StartContainer for \"10f48cd7068ee8ab0aa90a71770ab3b69adc88c98fde6ed879a35ed6b591ccc8\"" Sep 6 01:51:33.100667 systemd[1]: Started cri-containerd-10f48cd7068ee8ab0aa90a71770ab3b69adc88c98fde6ed879a35ed6b591ccc8.scope. Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.185514 kernel: audit: type=1400 audit(1757123493.173:1410): avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4a5b014098 items=0 ppid=4195 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.196495 kernel: audit: type=1300 audit(1757123493.173:1410): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4a5b014098 items=0 ppid=4195 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.210520 kernel: audit: type=1327 audit(1757123493.173:1410): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663438636437303638656538616230616139306137313737306162 Sep 6 01:51:33.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663438636437303638656538616230616139306137313737306162 Sep 6 01:51:33.225882 kernel: audit: type=1400 audit(1757123493.173:1411): avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.173000 audit: BPF prog-id=217 op=LOAD Sep 6 01:51:33.173000 audit[4735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000344078 items=0 ppid=4195 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663438636437303638656538616230616139306137313737306162 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit: BPF prog-id=218 op=LOAD Sep 6 01:51:33.174000 audit[4735]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003440c8 items=0 ppid=4195 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663438636437303638656538616230616139306137313737306162 Sep 6 01:51:33.174000 audit: BPF prog-id=218 op=UNLOAD Sep 6 01:51:33.174000 audit: BPF prog-id=217 op=UNLOAD Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.174000 audit: BPF prog-id=219 op=LOAD Sep 6 01:51:33.174000 audit[4735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000344158 items=0 ppid=4195 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130663438636437303638656538616230616139306137313737306162 Sep 6 01:51:33.243764 env[1201]: time="2025-09-06T01:51:33.243590906Z" level=info msg="StartContainer for \"10f48cd7068ee8ab0aa90a71770ab3b69adc88c98fde6ed879a35ed6b591ccc8\" returns successfully" Sep 6 01:51:33.314869 env[1201]: time="2025-09-06T01:51:33.314789324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7b9999d478-rzpr5,Uid:31c99817-cfcb-40a2-a8dd-943d6c53ba65,Namespace:calico-system,Attempt:0,}" Sep 6 01:51:33.566029 systemd[1]: run-containerd-runc-k8s.io-10f48cd7068ee8ab0aa90a71770ab3b69adc88c98fde6ed879a35ed6b591ccc8-runc.9lg5Fq.mount: Deactivated successfully. Sep 6 01:51:33.674961 systemd-networkd[1027]: cali1850a69e40b: Link UP Sep 6 01:51:33.686454 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 6 01:51:33.698566 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1850a69e40b: link becomes ready Sep 6 01:51:33.690492 systemd-networkd[1027]: cali1850a69e40b: Gained carrier Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.442 [INFO][4765] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0 whisker-7b9999d478- calico-system 31c99817-cfcb-40a2-a8dd-943d6c53ba65 1071 0 2025-09-06 01:51:32 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7b9999d478 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-lvab0.gb1.brightbox.com whisker-7b9999d478-rzpr5 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali1850a69e40b [] [] }} ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.442 [INFO][4765] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.504 [INFO][4777] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" HandleID="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.504 [INFO][4777] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" HandleID="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-lvab0.gb1.brightbox.com", "pod":"whisker-7b9999d478-rzpr5", "timestamp":"2025-09-06 01:51:33.504377727 +0000 UTC"}, Hostname:"srv-lvab0.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.504 [INFO][4777] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.505 [INFO][4777] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.505 [INFO][4777] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-lvab0.gb1.brightbox.com' Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.518 [INFO][4777] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.532 [INFO][4777] ipam/ipam.go 394: Looking up existing affinities for host host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.540 [INFO][4777] ipam/ipam.go 511: Trying affinity for 192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.543 [INFO][4777] ipam/ipam.go 158: Attempting to load block cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.554 [INFO][4777] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.554 [INFO][4777] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.566 [INFO][4777] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.574 [INFO][4777] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.592 [INFO][4777] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.83.137/26] block=192.168.83.128/26 handle="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.592 [INFO][4777] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.83.137/26] handle="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" host="srv-lvab0.gb1.brightbox.com" Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.592 [INFO][4777] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:51:33.733639 env[1201]: 2025-09-06 01:51:33.592 [INFO][4777] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.137/26] IPv6=[] ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" HandleID="k8s-pod-network.0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.761665 env[1201]: 2025-09-06 01:51:33.596 [INFO][4765] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0", GenerateName:"whisker-7b9999d478-", Namespace:"calico-system", SelfLink:"", UID:"31c99817-cfcb-40a2-a8dd-943d6c53ba65", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 51, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7b9999d478", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"", Pod:"whisker-7b9999d478-rzpr5", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.83.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1850a69e40b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:33.761665 env[1201]: 2025-09-06 01:51:33.596 [INFO][4765] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.83.137/32] ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.761665 env[1201]: 2025-09-06 01:51:33.596 [INFO][4765] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1850a69e40b ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.761665 env[1201]: 2025-09-06 01:51:33.692 [INFO][4765] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.761665 env[1201]: 2025-09-06 01:51:33.699 [INFO][4765] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0", GenerateName:"whisker-7b9999d478-", Namespace:"calico-system", SelfLink:"", UID:"31c99817-cfcb-40a2-a8dd-943d6c53ba65", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 51, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7b9999d478", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa", Pod:"whisker-7b9999d478-rzpr5", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.83.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1850a69e40b", MAC:"e6:a5:4c:cb:d8:9b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:51:33.761665 env[1201]: 2025-09-06 01:51:33.726 [INFO][4765] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa" Namespace="calico-system" Pod="whisker-7b9999d478-rzpr5" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--7b9999d478--rzpr5-eth0" Sep 6 01:51:33.832170 kubelet[1976]: I0906 01:51:33.830866 1976 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="87323d63-715c-4f88-bbb8-886336ab6529" path="/var/lib/kubelet/pods/87323d63-715c-4f88-bbb8-886336ab6529/volumes" Sep 6 01:51:33.835622 env[1201]: time="2025-09-06T01:51:33.835512689Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 6 01:51:33.835950 env[1201]: time="2025-09-06T01:51:33.835646485Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 6 01:51:33.835950 env[1201]: time="2025-09-06T01:51:33.835735632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 6 01:51:33.837313 env[1201]: time="2025-09-06T01:51:33.837217848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa pid=4799 runtime=io.containerd.runc.v2 Sep 6 01:51:33.873994 systemd[1]: Started cri-containerd-0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa.scope. Sep 6 01:51:33.882000 audit[4810]: NETFILTER_CFG table=filter:128 family=2 entries=81 op=nft_register_chain pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 6 01:51:33.900069 systemd[1]: run-containerd-runc-k8s.io-0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa-runc.weg1Sc.mount: Deactivated successfully. Sep 6 01:51:33.882000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=41200 a0=3 a1=7fff18564e40 a2=0 a3=7fff18564e2c items=0 ppid=3584 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.882000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit: BPF prog-id=220 op=LOAD Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4799 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346633393935303866343937363634373264383961656466663862 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4799 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346633393935303866343937363634373264383961656466663862 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit: BPF prog-id=221 op=LOAD Sep 6 01:51:33.951000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002afd10 items=0 ppid=4799 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346633393935303866343937363634373264383961656466663862 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.951000 audit: BPF prog-id=222 op=LOAD Sep 6 01:51:33.951000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002afd58 items=0 ppid=4799 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346633393935303866343937363634373264383961656466663862 Sep 6 01:51:33.951000 audit: BPF prog-id=222 op=UNLOAD Sep 6 01:51:33.952000 audit: BPF prog-id=221 op=UNLOAD Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:33.952000 audit: BPF prog-id=223 op=LOAD Sep 6 01:51:33.952000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000330168 items=0 ppid=4799 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:33.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346633393935303866343937363634373264383961656466663862 Sep 6 01:51:34.040924 env[1201]: time="2025-09-06T01:51:34.040831773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7b9999d478-rzpr5,Uid:31c99817-cfcb-40a2-a8dd-943d6c53ba65,Namespace:calico-system,Attempt:0,} returns sandbox id \"0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa\"" Sep 6 01:51:34.068955 env[1201]: time="2025-09-06T01:51:34.068721432Z" level=info msg="CreateContainer within sandbox \"0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 6 01:51:34.101552 env[1201]: time="2025-09-06T01:51:34.099123925Z" level=info msg="CreateContainer within sandbox \"0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"41eec52952d0218c9dd310eeecc6947be89b702ee1e211792355f6623e30042f\"" Sep 6 01:51:34.102785 env[1201]: time="2025-09-06T01:51:34.102704851Z" level=info msg="StartContainer for \"41eec52952d0218c9dd310eeecc6947be89b702ee1e211792355f6623e30042f\"" Sep 6 01:51:34.186441 systemd[1]: Started cri-containerd-41eec52952d0218c9dd310eeecc6947be89b702ee1e211792355f6623e30042f.scope. Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.249000 audit: BPF prog-id=224 op=LOAD Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4799 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656563353239353264303231386339646433313065656563633639 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4799 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656563353239353264303231386339646433313065656563633639 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.251000 audit: BPF prog-id=225 op=LOAD Sep 6 01:51:34.251000 audit[4840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003822f0 items=0 ppid=4799 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656563353239353264303231386339646433313065656563633639 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.252000 audit: BPF prog-id=226 op=LOAD Sep 6 01:51:34.252000 audit[4840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000382338 items=0 ppid=4799 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656563353239353264303231386339646433313065656563633639 Sep 6 01:51:34.252000 audit: BPF prog-id=226 op=UNLOAD Sep 6 01:51:34.252000 audit: BPF prog-id=225 op=UNLOAD Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.255000 audit: BPF prog-id=227 op=LOAD Sep 6 01:51:34.255000 audit[4840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000382748 items=0 ppid=4799 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656563353239353264303231386339646433313065656563633639 Sep 6 01:51:34.317893 env[1201]: time="2025-09-06T01:51:34.317833552Z" level=info msg="StartContainer for \"41eec52952d0218c9dd310eeecc6947be89b702ee1e211792355f6623e30042f\" returns successfully" Sep 6 01:51:34.325515 env[1201]: time="2025-09-06T01:51:34.324759667Z" level=info msg="CreateContainer within sandbox \"0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 6 01:51:34.343847 env[1201]: time="2025-09-06T01:51:34.343796350Z" level=info msg="CreateContainer within sandbox \"0e4f399508f49766472d89aedff8b6ccc61f9f7241a6b22bcaebd28619f039fa\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"090d7e0d55aa5a33685a6024915beab31961974b7f1505633bc467d7f633f355\"" Sep 6 01:51:34.344962 env[1201]: time="2025-09-06T01:51:34.344926105Z" level=info msg="StartContainer for \"090d7e0d55aa5a33685a6024915beab31961974b7f1505633bc467d7f633f355\"" Sep 6 01:51:34.402201 systemd[1]: Started cri-containerd-090d7e0d55aa5a33685a6024915beab31961974b7f1505633bc467d7f633f355.scope. Sep 6 01:51:34.492000 audit[4851]: AVC avc: denied { search } for pid=4851 comm="nginx" name="crypto" dev="proc" ino=36166 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c273 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 6 01:51:34.492000 audit[4851]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4735d62728 a2=0 a3=0 items=0 ppid=4799 pid=4851 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c273 key=(null) Sep 6 01:51:34.492000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.510000 audit: BPF prog-id=228 op=LOAD Sep 6 01:51:34.511000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.511000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4799 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306437653064353561613561333336383561363032343931356265 Sep 6 01:51:34.511000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.511000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4799 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306437653064353561613561333336383561363032343931356265 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit: BPF prog-id=229 op=LOAD Sep 6 01:51:34.512000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00026c020 items=0 ppid=4799 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306437653064353561613561333336383561363032343931356265 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit: BPF prog-id=230 op=LOAD Sep 6 01:51:34.512000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00026c068 items=0 ppid=4799 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306437653064353561613561333336383561363032343931356265 Sep 6 01:51:34.512000 audit: BPF prog-id=230 op=UNLOAD Sep 6 01:51:34.512000 audit: BPF prog-id=229 op=UNLOAD Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { perfmon } for pid=4874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit[4874]: AVC avc: denied { bpf } for pid=4874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:34.512000 audit: BPF prog-id=231 op=LOAD Sep 6 01:51:34.512000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00026c478 items=0 ppid=4799 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:34.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306437653064353561613561333336383561363032343931356265 Sep 6 01:51:34.760184 env[1201]: time="2025-09-06T01:51:34.759948731Z" level=info msg="StartContainer for \"090d7e0d55aa5a33685a6024915beab31961974b7f1505633bc467d7f633f355\" returns successfully" Sep 6 01:51:34.791000 audit[4530]: AVC avc: denied { watch } for pid=4530 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_51_00.2741231142/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c530 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c134,c530 tclass=file permissive=0 Sep 6 01:51:34.791000 audit[4530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b69520 a2=fc6 a3=0 items=0 ppid=4477 pid=4530 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c530 key=(null) Sep 6 01:51:34.791000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:51:35.125000 audit[4906]: NETFILTER_CFG table=filter:129 family=2 entries=13 op=nft_register_rule pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:35.125000 audit[4906]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc5c7c3560 a2=0 a3=7ffc5c7c354c items=0 ppid=2097 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:35.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:35.132000 audit[4906]: NETFILTER_CFG table=nat:130 family=2 entries=27 op=nft_register_chain pid=4906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:35.132000 audit[4906]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc5c7c3560 a2=0 a3=7ffc5c7c354c items=0 ppid=2097 pid=4906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:35.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:35.587000 audit[4910]: NETFILTER_CFG table=filter:131 family=2 entries=11 op=nft_register_rule pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:35.587000 audit[4910]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdcd110c30 a2=0 a3=7ffdcd110c1c items=0 ppid=2097 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:35.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:35.607000 audit[4910]: NETFILTER_CFG table=nat:132 family=2 entries=29 op=nft_register_chain pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:35.607000 audit[4910]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffdcd110c30 a2=0 a3=7ffdcd110c1c items=0 ppid=2097 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:35.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:35.612840 systemd-networkd[1027]: cali1850a69e40b: Gained IPv6LL Sep 6 01:51:37.191902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3406920858.mount: Deactivated successfully. Sep 6 01:51:38.516050 env[1201]: time="2025-09-06T01:51:38.515989358Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:38.519174 env[1201]: time="2025-09-06T01:51:38.519131720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:38.521385 env[1201]: time="2025-09-06T01:51:38.521345808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:38.523742 env[1201]: time="2025-09-06T01:51:38.523695227Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:38.525071 env[1201]: time="2025-09-06T01:51:38.525024295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 6 01:51:38.578222 env[1201]: time="2025-09-06T01:51:38.577987597Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 6 01:51:38.599797 env[1201]: time="2025-09-06T01:51:38.599616798Z" level=info msg="CreateContainer within sandbox \"6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 6 01:51:38.619946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3661715014.mount: Deactivated successfully. Sep 6 01:51:38.625989 env[1201]: time="2025-09-06T01:51:38.625845760Z" level=info msg="CreateContainer within sandbox \"6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0\"" Sep 6 01:51:38.629162 env[1201]: time="2025-09-06T01:51:38.629124136Z" level=info msg="StartContainer for \"80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0\"" Sep 6 01:51:38.681515 systemd[1]: Started cri-containerd-80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0.scope. Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.728984 kernel: kauditd_printk_skb: 231 callbacks suppressed Sep 6 01:51:38.744451 kernel: audit: type=1400 audit(1757123498.718:1477): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.745061 kernel: audit: type=1400 audit(1757123498.718:1478): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.747746 kernel: audit: type=1400 audit(1757123498.718:1479): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.754439 kernel: audit: type=1400 audit(1757123498.718:1480): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.754546 kernel: audit: type=1400 audit(1757123498.718:1481): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.754787 kernel: audit: type=1400 audit(1757123498.718:1482): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.774030 kernel: audit: type=1400 audit(1757123498.718:1483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.774666 kernel: audit: type=1400 audit(1757123498.718:1484): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.790508 kernel: audit: type=1400 audit(1757123498.718:1485): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.800518 kernel: audit: type=1400 audit(1757123498.718:1486): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.718000 audit: BPF prog-id=232 op=LOAD Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4355 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:38.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830623831396464316166336662383530356437303335343439343132 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4355 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:38.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830623831396464316166336662383530356437303335343439343132 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.723000 audit: BPF prog-id=233 op=LOAD Sep 6 01:51:38.723000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00037d7d0 items=0 ppid=4355 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:38.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830623831396464316166336662383530356437303335343439343132 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.738000 audit: BPF prog-id=234 op=LOAD Sep 6 01:51:38.738000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00037d818 items=0 ppid=4355 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:38.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830623831396464316166336662383530356437303335343439343132 Sep 6 01:51:38.756000 audit: BPF prog-id=234 op=UNLOAD Sep 6 01:51:38.756000 audit: BPF prog-id=233 op=UNLOAD Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:38.758000 audit: BPF prog-id=235 op=LOAD Sep 6 01:51:38.758000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037dc28 items=0 ppid=4355 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:38.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830623831396464316166336662383530356437303335343439343132 Sep 6 01:51:38.863065 env[1201]: time="2025-09-06T01:51:38.862980758Z" level=info msg="StartContainer for \"80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0\" returns successfully" Sep 6 01:51:39.679320 systemd[1]: run-containerd-runc-k8s.io-80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0-runc.cGNw7I.mount: Deactivated successfully. Sep 6 01:51:39.768200 kubelet[1976]: I0906 01:51:39.705140 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-7b9999d478-rzpr5" podStartSLOduration=7.655848082 podStartE2EDuration="7.655848082s" podCreationTimestamp="2025-09-06 01:51:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-06 01:51:35.543913497 +0000 UTC m=+69.966533282" watchObservedRunningTime="2025-09-06 01:51:39.655848082 +0000 UTC m=+74.078467863" Sep 6 01:51:39.856000 audit[4971]: NETFILTER_CFG table=filter:133 family=2 entries=10 op=nft_register_rule pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:39.856000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff6d5c7000 a2=0 a3=7fff6d5c6fec items=0 ppid=2097 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:39.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:39.869000 audit[4971]: NETFILTER_CFG table=nat:134 family=2 entries=24 op=nft_register_rule pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:39.869000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fff6d5c7000 a2=0 a3=7fff6d5c6fec items=0 ppid=2097 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:39.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:40.653078 systemd[1]: run-containerd-runc-k8s.io-80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0-runc.zgOIHI.mount: Deactivated successfully. Sep 6 01:51:41.676795 systemd[1]: run-containerd-runc-k8s.io-80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0-runc.7EcSGw.mount: Deactivated successfully. Sep 6 01:51:43.651537 env[1201]: time="2025-09-06T01:51:43.651448873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:43.656233 env[1201]: time="2025-09-06T01:51:43.655270679Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:43.657257 env[1201]: time="2025-09-06T01:51:43.657222711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:43.659033 env[1201]: time="2025-09-06T01:51:43.658995106Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:43.660190 env[1201]: time="2025-09-06T01:51:43.660134301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 6 01:51:43.681386 env[1201]: time="2025-09-06T01:51:43.681090737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 6 01:51:43.798016 env[1201]: time="2025-09-06T01:51:43.797937778Z" level=info msg="CreateContainer within sandbox \"30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 6 01:51:43.823116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount438704593.mount: Deactivated successfully. Sep 6 01:51:43.826864 env[1201]: time="2025-09-06T01:51:43.826796858Z" level=info msg="CreateContainer within sandbox \"30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f\"" Sep 6 01:51:43.831742 env[1201]: time="2025-09-06T01:51:43.831652146Z" level=info msg="StartContainer for \"b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f\"" Sep 6 01:51:43.876565 systemd[1]: Started cri-containerd-b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f.scope. Sep 6 01:51:43.931213 kernel: kauditd_printk_skb: 53 callbacks suppressed Sep 6 01:51:43.948027 kernel: audit: type=1400 audit(1757123503.920:1497): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.953852 kernel: audit: type=1400 audit(1757123503.920:1498): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.953933 kernel: audit: type=1400 audit(1757123503.920:1499): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.954264 kernel: audit: type=1400 audit(1757123503.920:1500): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.954353 kernel: audit: type=1400 audit(1757123503.920:1501): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.961906 kernel: audit: type=1400 audit(1757123503.920:1502): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.972653 kernel: audit: type=1400 audit(1757123503.920:1503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.979868 kernel: audit: type=1400 audit(1757123503.920:1504): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.991339 kernel: audit: type=1400 audit(1757123503.920:1505): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.991426 kernel: audit: type=1400 audit(1757123503.929:1506): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.929000 audit: BPF prog-id=236 op=LOAD Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4404 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:43.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230303831313061663134333663303932373138343533363965343062 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4404 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:43.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230303831313061663134333663303932373138343533363965343062 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.940000 audit: BPF prog-id=237 op=LOAD Sep 6 01:51:43.940000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000259bb0 items=0 ppid=4404 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:43.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230303831313061663134333663303932373138343533363965343062 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.941000 audit: BPF prog-id=238 op=LOAD Sep 6 01:51:43.941000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000259bf8 items=0 ppid=4404 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:43.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230303831313061663134333663303932373138343533363965343062 Sep 6 01:51:43.951000 audit: BPF prog-id=238 op=UNLOAD Sep 6 01:51:43.951000 audit: BPF prog-id=237 op=UNLOAD Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:43.951000 audit: BPF prog-id=239 op=LOAD Sep 6 01:51:43.951000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a8008 items=0 ppid=4404 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:43.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230303831313061663134333663303932373138343533363965343062 Sep 6 01:51:44.024531 env[1201]: time="2025-09-06T01:51:44.024403368Z" level=info msg="StartContainer for \"b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f\" returns successfully" Sep 6 01:51:44.829139 kubelet[1976]: I0906 01:51:44.825785 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-798f59b8c7-m4nnq" podStartSLOduration=43.905446897 podStartE2EDuration="57.818459106s" podCreationTimestamp="2025-09-06 01:50:47 +0000 UTC" firstStartedPulling="2025-09-06 01:51:29.760049508 +0000 UTC m=+64.182669275" lastFinishedPulling="2025-09-06 01:51:43.673061707 +0000 UTC m=+78.095681484" observedRunningTime="2025-09-06 01:51:44.793032116 +0000 UTC m=+79.215651892" watchObservedRunningTime="2025-09-06 01:51:44.818459106 +0000 UTC m=+79.241078882" Sep 6 01:51:44.833374 kubelet[1976]: I0906 01:51:44.829775 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-54d579b49d-6ngzs" podStartSLOduration=49.970462997 podStartE2EDuration="58.829745765s" podCreationTimestamp="2025-09-06 01:50:46 +0000 UTC" firstStartedPulling="2025-09-06 01:51:29.684810945 +0000 UTC m=+64.107430719" lastFinishedPulling="2025-09-06 01:51:38.544093692 +0000 UTC m=+72.966713487" observedRunningTime="2025-09-06 01:51:39.778434589 +0000 UTC m=+74.201054363" watchObservedRunningTime="2025-09-06 01:51:44.829745765 +0000 UTC m=+79.252365536" Sep 6 01:51:45.099548 kubelet[1976]: I0906 01:51:45.099086 1976 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 6 01:51:45.367000 audit[5069]: NETFILTER_CFG table=filter:135 family=2 entries=10 op=nft_register_rule pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:45.367000 audit[5069]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcec7d5a30 a2=0 a3=7ffcec7d5a1c items=0 ppid=2097 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:45.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:45.378000 audit[5069]: NETFILTER_CFG table=nat:136 family=2 entries=36 op=nft_register_chain pid=5069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:51:45.378000 audit[5069]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffcec7d5a30 a2=0 a3=7ffcec7d5a1c items=0 ppid=2097 pid=5069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:45.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:51:45.743505 systemd[1]: run-containerd-runc-k8s.io-b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f-runc.07vRHc.mount: Deactivated successfully. Sep 6 01:51:46.146626 systemd[1]: run-containerd-runc-k8s.io-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac-runc.OYISMP.mount: Deactivated successfully. Sep 6 01:51:46.331860 env[1201]: time="2025-09-06T01:51:46.331800147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:46.340694 env[1201]: time="2025-09-06T01:51:46.340646803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:46.343423 env[1201]: time="2025-09-06T01:51:46.343233613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:46.345261 env[1201]: time="2025-09-06T01:51:46.345225763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 6 01:51:46.346111 env[1201]: time="2025-09-06T01:51:46.346020602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 6 01:51:46.358218 env[1201]: time="2025-09-06T01:51:46.357928726Z" level=info msg="CreateContainer within sandbox \"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 6 01:51:46.386937 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3826911246.mount: Deactivated successfully. Sep 6 01:51:46.398599 env[1201]: time="2025-09-06T01:51:46.398530850Z" level=info msg="CreateContainer within sandbox \"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"acc2002d0bacf6e67e3b2c54f057c6bb05057bcae138af6c65937708cda3e56e\"" Sep 6 01:51:46.399844 env[1201]: time="2025-09-06T01:51:46.399804733Z" level=info msg="StartContainer for \"acc2002d0bacf6e67e3b2c54f057c6bb05057bcae138af6c65937708cda3e56e\"" Sep 6 01:51:46.439873 systemd[1]: Started cri-containerd-acc2002d0bacf6e67e3b2c54f057c6bb05057bcae138af6c65937708cda3e56e.scope. Sep 6 01:51:46.535000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.535000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1eee92f488 items=0 ppid=4195 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:46.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633230303264306261636636653637653362326335346630353763 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit: BPF prog-id=240 op=LOAD Sep 6 01:51:46.536000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000261ba8 items=0 ppid=4195 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:46.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633230303264306261636636653637653362326335346630353763 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.536000 audit: BPF prog-id=241 op=LOAD Sep 6 01:51:46.536000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000261bf8 items=0 ppid=4195 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:46.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633230303264306261636636653637653362326335346630353763 Sep 6 01:51:46.536000 audit: BPF prog-id=241 op=UNLOAD Sep 6 01:51:46.537000 audit: BPF prog-id=240 op=UNLOAD Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 6 01:51:46.537000 audit: BPF prog-id=242 op=LOAD Sep 6 01:51:46.537000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000261c88 items=0 ppid=4195 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:46.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163633230303264306261636636653637653362326335346630353763 Sep 6 01:51:46.586711 env[1201]: time="2025-09-06T01:51:46.583053463Z" level=info msg="StartContainer for \"acc2002d0bacf6e67e3b2c54f057c6bb05057bcae138af6c65937708cda3e56e\" returns successfully" Sep 6 01:51:46.921766 kubelet[1976]: I0906 01:51:46.921651 1976 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-hx2m2" podStartSLOduration=43.169562654 podStartE2EDuration="1m0.917457099s" podCreationTimestamp="2025-09-06 01:50:46 +0000 UTC" firstStartedPulling="2025-09-06 01:51:28.600161036 +0000 UTC m=+63.022780810" lastFinishedPulling="2025-09-06 01:51:46.348055488 +0000 UTC m=+80.770675255" observedRunningTime="2025-09-06 01:51:46.822631383 +0000 UTC m=+81.245251168" watchObservedRunningTime="2025-09-06 01:51:46.917457099 +0000 UTC m=+81.340076879" Sep 6 01:51:47.120029 kubelet[1976]: I0906 01:51:47.096432 1976 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 6 01:51:47.121264 kubelet[1976]: I0906 01:51:47.121234 1976 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 6 01:51:53.012072 kernel: kauditd_printk_skb: 96 callbacks suppressed Sep 6 01:51:53.027295 kernel: audit: type=1130 audit(1757123512.997:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.243.73.226:22-139.178.89.65:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:51:52.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.243.73.226:22-139.178.89.65:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:51:52.995345 systemd[1]: Started sshd@7-10.243.73.226:22-139.178.89.65:38738.service. Sep 6 01:51:54.005496 sshd[5154]: Accepted publickey for core from 139.178.89.65 port 38738 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:51:54.043950 kernel: audit: type=1101 audit(1757123514.002:1524): pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.044192 kernel: audit: type=1103 audit(1757123514.018:1525): pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.045172 kernel: audit: type=1006 audit(1757123514.018:1526): pid=5154 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Sep 6 01:51:54.046184 kernel: audit: type=1300 audit(1757123514.018:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd37253290 a2=3 a3=0 items=0 ppid=1 pid=5154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:54.047306 kernel: audit: type=1327 audit(1757123514.018:1526): proctitle=737368643A20636F7265205B707269765D Sep 6 01:51:54.002000 audit[5154]: USER_ACCT pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.018000 audit[5154]: CRED_ACQ pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.018000 audit[5154]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd37253290 a2=3 a3=0 items=0 ppid=1 pid=5154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:51:54.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:51:54.039009 sshd[5154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:51:54.110709 systemd-logind[1194]: New session 8 of user core. Sep 6 01:51:54.121421 systemd[1]: Started session-8.scope. Sep 6 01:51:54.130000 audit[5154]: USER_START pid=5154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.141176 kernel: audit: type=1105 audit(1757123514.130:1527): pid=5154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.141262 kernel: audit: type=1103 audit(1757123514.139:1528): pid=5158 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:54.139000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:55.567439 sshd[5154]: pam_unix(sshd:session): session closed for user core Sep 6 01:51:55.571000 audit[5154]: USER_END pid=5154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:55.589343 kernel: audit: type=1106 audit(1757123515.571:1529): pid=5154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:55.592056 kernel: audit: type=1104 audit(1757123515.579:1530): pid=5154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:55.579000 audit[5154]: CRED_DISP pid=5154 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:51:55.589061 systemd[1]: sshd@7-10.243.73.226:22-139.178.89.65:38738.service: Deactivated successfully. Sep 6 01:51:55.597241 systemd[1]: session-8.scope: Deactivated successfully. Sep 6 01:51:55.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.243.73.226:22-139.178.89.65:38738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:51:55.598878 systemd-logind[1194]: Session 8 logged out. Waiting for processes to exit. Sep 6 01:51:55.605082 systemd-logind[1194]: Removed session 8. Sep 6 01:52:00.746787 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 6 01:52:00.749032 kernel: audit: type=1130 audit(1757123520.730:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.243.73.226:22-139.178.89.65:32974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:00.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.243.73.226:22-139.178.89.65:32974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:00.731571 systemd[1]: Started sshd@8-10.243.73.226:22-139.178.89.65:32974.service. Sep 6 01:52:01.752000 audit[5179]: USER_ACCT pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.766630 kernel: audit: type=1101 audit(1757123521.752:1533): pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.768562 sshd[5179]: Accepted publickey for core from 139.178.89.65 port 32974 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:01.779000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.788495 kernel: audit: type=1103 audit(1757123521.779:1534): pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.790174 sshd[5179]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:01.798504 kernel: audit: type=1006 audit(1757123521.779:1535): pid=5179 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Sep 6 01:52:01.779000 audit[5179]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6f72f2b0 a2=3 a3=0 items=0 ppid=1 pid=5179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:01.810528 kernel: audit: type=1300 audit(1757123521.779:1535): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6f72f2b0 a2=3 a3=0 items=0 ppid=1 pid=5179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:01.819540 kernel: audit: type=1327 audit(1757123521.779:1535): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:01.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:01.818886 systemd[1]: Started session-9.scope. Sep 6 01:52:01.820583 systemd-logind[1194]: New session 9 of user core. Sep 6 01:52:01.832000 audit[5179]: USER_START pid=5179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.843368 kernel: audit: type=1105 audit(1757123521.832:1536): pid=5179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.843517 kernel: audit: type=1103 audit(1757123521.841:1537): pid=5183 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:01.841000 audit[5183]: CRED_ACQ pid=5183 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:03.039395 sshd[5179]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:03.039000 audit[5179]: USER_END pid=5179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:03.045527 systemd[1]: sshd@8-10.243.73.226:22-139.178.89.65:32974.service: Deactivated successfully. Sep 6 01:52:03.052498 kernel: audit: type=1106 audit(1757123523.039:1538): pid=5179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:03.053390 systemd[1]: session-9.scope: Deactivated successfully. Sep 6 01:52:03.054666 systemd-logind[1194]: Session 9 logged out. Waiting for processes to exit. Sep 6 01:52:03.039000 audit[5179]: CRED_DISP pid=5179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:03.063533 kernel: audit: type=1104 audit(1757123523.039:1539): pid=5179 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:03.063676 systemd-logind[1194]: Removed session 9. Sep 6 01:52:03.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.243.73.226:22-139.178.89.65:32974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:08.194739 systemd[1]: Started sshd@9-10.243.73.226:22-139.178.89.65:32978.service. Sep 6 01:52:08.209520 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 6 01:52:08.211341 kernel: audit: type=1130 audit(1757123528.196:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.243.73.226:22-139.178.89.65:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:08.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.243.73.226:22-139.178.89.65:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:09.156000 audit[5213]: USER_ACCT pid=5213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.185840 kernel: audit: type=1101 audit(1757123529.156:1542): pid=5213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.186257 sshd[5213]: Accepted publickey for core from 139.178.89.65 port 32978 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:09.187021 sshd[5213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:09.183000 audit[5213]: CRED_ACQ pid=5213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.205504 kernel: audit: type=1103 audit(1757123529.183:1543): pid=5213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.209744 systemd-logind[1194]: New session 10 of user core. Sep 6 01:52:09.211163 systemd[1]: Started session-10.scope. Sep 6 01:52:09.216618 kernel: audit: type=1006 audit(1757123529.183:1544): pid=5213 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 6 01:52:09.216713 kernel: audit: type=1300 audit(1757123529.183:1544): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb581530 a2=3 a3=0 items=0 ppid=1 pid=5213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:09.183000 audit[5213]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb581530 a2=3 a3=0 items=0 ppid=1 pid=5213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:09.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:09.226507 kernel: audit: type=1327 audit(1757123529.183:1544): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:09.231000 audit[5213]: USER_START pid=5213 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.241299 kernel: audit: type=1105 audit(1757123529.231:1545): pid=5213 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.241448 kernel: audit: type=1103 audit(1757123529.239:1546): pid=5215 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:09.239000 audit[5215]: CRED_ACQ pid=5215 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:10.405217 sshd[5213]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:10.407000 audit[5213]: USER_END pid=5213 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:10.424444 systemd[1]: sshd@9-10.243.73.226:22-139.178.89.65:32978.service: Deactivated successfully. Sep 6 01:52:10.428985 kernel: audit: type=1106 audit(1757123530.407:1547): pid=5213 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:10.426730 systemd[1]: session-10.scope: Deactivated successfully. Sep 6 01:52:10.407000 audit[5213]: CRED_DISP pid=5213 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:10.430509 systemd-logind[1194]: Session 10 logged out. Waiting for processes to exit. Sep 6 01:52:10.437506 kernel: audit: type=1104 audit(1757123530.407:1548): pid=5213 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:10.439271 systemd-logind[1194]: Removed session 10. Sep 6 01:52:10.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.243.73.226:22-139.178.89.65:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:10.595256 systemd[1]: Started sshd@10-10.243.73.226:22-139.178.89.65:52362.service. Sep 6 01:52:10.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.243.73.226:22-139.178.89.65:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:11.618268 sshd[5226]: Accepted publickey for core from 139.178.89.65 port 52362 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:11.616000 audit[5226]: USER_ACCT pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:11.619000 audit[5226]: CRED_ACQ pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:11.619000 audit[5226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe50161c60 a2=3 a3=0 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:11.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:11.622342 sshd[5226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:11.631162 systemd-logind[1194]: New session 11 of user core. Sep 6 01:52:11.632260 systemd[1]: Started session-11.scope. Sep 6 01:52:11.641000 audit[5226]: USER_START pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:11.644000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:11.672722 systemd[1]: run-containerd-runc-k8s.io-80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0-runc.yFDFuz.mount: Deactivated successfully. Sep 6 01:52:12.972604 sshd[5226]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:12.979000 audit[5226]: USER_END pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:12.980000 audit[5226]: CRED_DISP pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:12.988355 systemd[1]: sshd@10-10.243.73.226:22-139.178.89.65:52362.service: Deactivated successfully. Sep 6 01:52:12.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.243.73.226:22-139.178.89.65:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:12.988000 audit[5253]: NETFILTER_CFG table=filter:137 family=2 entries=9 op=nft_register_rule pid=5253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:12.988000 audit[5253]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff83e63490 a2=0 a3=7fff83e6347c items=0 ppid=2097 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:12.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:12.996000 audit[5253]: NETFILTER_CFG table=nat:138 family=2 entries=31 op=nft_register_chain pid=5253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:12.996000 audit[5253]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fff83e63490 a2=0 a3=7fff83e6347c items=0 ppid=2097 pid=5253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:12.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:12.989419 systemd[1]: session-11.scope: Deactivated successfully. Sep 6 01:52:12.990794 systemd-logind[1194]: Session 11 logged out. Waiting for processes to exit. Sep 6 01:52:12.996167 systemd-logind[1194]: Removed session 11. Sep 6 01:52:13.100158 systemd[1]: Started sshd@11-10.243.73.226:22-139.178.89.65:52368.service. Sep 6 01:52:13.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.243.73.226:22-139.178.89.65:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:14.089286 kernel: kauditd_printk_skb: 19 callbacks suppressed Sep 6 01:52:14.091870 kernel: audit: type=1101 audit(1757123534.069:1562): pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.069000 audit[5256]: USER_ACCT pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.101732 kernel: audit: type=1103 audit(1757123534.091:1563): pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.101856 kernel: audit: type=1006 audit(1757123534.091:1564): pid=5256 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 6 01:52:14.091000 audit[5256]: CRED_ACQ pid=5256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.102122 sshd[5256]: Accepted publickey for core from 139.178.89.65 port 52368 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:14.096168 sshd[5256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:14.091000 audit[5256]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe44499760 a2=3 a3=0 items=0 ppid=1 pid=5256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:14.123727 kernel: audit: type=1300 audit(1757123534.091:1564): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe44499760 a2=3 a3=0 items=0 ppid=1 pid=5256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:14.123830 kernel: audit: type=1327 audit(1757123534.091:1564): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:14.091000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:14.145309 systemd-logind[1194]: New session 12 of user core. Sep 6 01:52:14.149664 systemd[1]: Started session-12.scope. Sep 6 01:52:14.161000 audit[5256]: USER_START pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.171512 kernel: audit: type=1105 audit(1757123534.161:1565): pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.173000 audit[5259]: CRED_ACQ pid=5259 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:14.181510 kernel: audit: type=1103 audit(1757123534.173:1566): pid=5259 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:15.177194 sshd[5256]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:15.179000 audit[5256]: USER_END pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:15.195511 kernel: audit: type=1106 audit(1757123535.179:1567): pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:15.208136 kernel: audit: type=1104 audit(1757123535.186:1568): pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:15.214700 kernel: audit: type=1131 audit(1757123535.200:1569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.243.73.226:22-139.178.89.65:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:15.186000 audit[5256]: CRED_DISP pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:15.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.243.73.226:22-139.178.89.65:52368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:15.201610 systemd[1]: sshd@11-10.243.73.226:22-139.178.89.65:52368.service: Deactivated successfully. Sep 6 01:52:15.203239 systemd[1]: session-12.scope: Deactivated successfully. Sep 6 01:52:15.207485 systemd-logind[1194]: Session 12 logged out. Waiting for processes to exit. Sep 6 01:52:15.214947 systemd-logind[1194]: Removed session 12. Sep 6 01:52:15.776782 systemd[1]: run-containerd-runc-k8s.io-b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f-runc.y8SKsz.mount: Deactivated successfully. Sep 6 01:52:16.132447 systemd[1]: run-containerd-runc-k8s.io-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac-runc.g96X7B.mount: Deactivated successfully. Sep 6 01:52:17.902000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:17.902000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027f5720 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:17.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:17.902000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:17.902000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d5ed80 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:17.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:20.342661 systemd[1]: Started sshd@12-10.243.73.226:22-139.178.89.65:59250.service. Sep 6 01:52:20.367370 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 6 01:52:20.370314 kernel: audit: type=1130 audit(1757123540.341:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.243.73.226:22-139.178.89.65:59250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:20.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.243.73.226:22-139.178.89.65:59250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:21.331000 audit[5315]: USER_ACCT pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.336790 sshd[5315]: Accepted publickey for core from 139.178.89.65 port 59250 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:21.345435 kernel: audit: type=1101 audit(1757123541.331:1573): pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.345607 kernel: audit: type=1103 audit(1757123541.343:1574): pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.343000 audit[5315]: CRED_ACQ pid=5315 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.349310 sshd[5315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:21.356006 kernel: audit: type=1006 audit(1757123541.344:1575): pid=5315 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Sep 6 01:52:21.344000 audit[5315]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4407c20 a2=3 a3=0 items=0 ppid=1 pid=5315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:21.364611 kernel: audit: type=1300 audit(1757123541.344:1575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca4407c20 a2=3 a3=0 items=0 ppid=1 pid=5315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:21.344000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:21.371537 kernel: audit: type=1327 audit(1757123541.344:1575): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:21.382525 systemd-logind[1194]: New session 13 of user core. Sep 6 01:52:21.388094 systemd[1]: Started session-13.scope. Sep 6 01:52:21.400000 audit[5315]: USER_START pid=5315 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.410522 kernel: audit: type=1105 audit(1757123541.400:1576): pid=5315 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.410678 kernel: audit: type=1103 audit(1757123541.408:1577): pid=5317 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.408000 audit[5317]: CRED_ACQ pid=5317 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:21.596000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.596000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.610673 kernel: audit: type=1400 audit(1757123541.596:1578): avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.611144 kernel: audit: type=1400 audit(1757123541.596:1579): avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.596000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c0132de5c0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:52:21.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:52:21.601000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.601000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c0132de5e0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:52:21.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:52:21.602000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526394 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.602000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c012e43e30 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:52:21.602000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:52:21.596000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c015d84cc0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:52:21.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:52:21.604000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.604000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c015d84d20 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:52:21.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:52:21.605000 audit[1798]: AVC avc: denied { watch } for pid=1798 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526398 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:21.605000 audit[1798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c015d84db0 a2=fc6 a3=0 items=0 ppid=1666 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c450 key=(null) Sep 6 01:52:21.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234332E37332E323236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 6 01:52:22.682151 sshd[5315]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:22.684000 audit[5315]: USER_END pid=5315 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:22.684000 audit[5315]: CRED_DISP pid=5315 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:22.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.243.73.226:22-139.178.89.65:59250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:22.690172 systemd-logind[1194]: Session 13 logged out. Waiting for processes to exit. Sep 6 01:52:22.691549 systemd[1]: sshd@12-10.243.73.226:22-139.178.89.65:59250.service: Deactivated successfully. Sep 6 01:52:22.695308 systemd[1]: session-13.scope: Deactivated successfully. Sep 6 01:52:22.696698 systemd-logind[1194]: Removed session 13. Sep 6 01:52:24.025000 audit[3796]: AVC avc: denied { watch } for pid=3796 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_51_00.322866223/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c940 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c940 tclass=file permissive=0 Sep 6 01:52:24.025000 audit[3796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00260d240 a2=fc6 a3=0 items=0 ppid=3402 pid=3796 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c940 key=(null) Sep 6 01:52:24.025000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:52:27.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.243.73.226:22-139.178.89.65:59262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:27.884507 kernel: kauditd_printk_skb: 22 callbacks suppressed Sep 6 01:52:27.887575 kernel: audit: type=1130 audit(1757123547.858:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.243.73.226:22-139.178.89.65:59262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:27.859342 systemd[1]: Started sshd@13-10.243.73.226:22-139.178.89.65:59262.service. Sep 6 01:52:28.658000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.671522 kernel: audit: type=1400 audit(1757123548.658:1589): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.658000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2200 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.682501 kernel: audit: type=1300 audit(1757123548.658:1589): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2200 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.692505 kernel: audit: type=1327 audit(1757123548.658:1589): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.663000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.706968 kernel: audit: type=1400 audit(1757123548.663:1590): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.707259 kernel: audit: type=1300 audit(1757123548.663:1590): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2220 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.663000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2220 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.720795 kernel: audit: type=1327 audit(1757123548.663:1590): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.720958 kernel: audit: type=1400 audit(1757123548.669:1591): avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.669000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.669000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2240 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.742359 kernel: audit: type=1300 audit(1757123548.669:1591): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2240 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.669000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.677000 audit[1865]: AVC avc: denied { watch } for pid=1865 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526392 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 6 01:52:28.750548 kernel: audit: type=1327 audit(1757123548.669:1591): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.677000 audit[1865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad2700 a2=fc6 a3=0 items=0 ppid=1702 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c614 key=(null) Sep 6 01:52:28.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 6 01:52:28.767491 env[1201]: time="2025-09-06T01:52:28.766658261Z" level=info msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" Sep 6 01:52:28.911000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:28.913000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:28.913000 audit[5331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6b76d180 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:28.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:28.925232 sshd[5331]: Accepted publickey for core from 139.178.89.65 port 59262 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:28.918662 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:28.956721 systemd-logind[1194]: New session 14 of user core. Sep 6 01:52:28.958512 systemd[1]: Started session-14.scope. Sep 6 01:52:28.980000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:28.984000 audit[5347]: CRED_ACQ pid=5347 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.117 [WARNING][5342] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"00b78940-5f73-4204-96b1-330a29fc1d16", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da", Pod:"coredns-668d6bf9bc-5tx9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6eb2990dd4c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.121 [INFO][5342] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.121 [INFO][5342] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" iface="eth0" netns="" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.121 [INFO][5342] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.121 [INFO][5342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.366 [INFO][5350] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.369 [INFO][5350] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.370 [INFO][5350] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.400 [WARNING][5350] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.400 [INFO][5350] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.405 [INFO][5350] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:29.411715 env[1201]: 2025-09-06 01:52:29.409 [INFO][5342] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.426089 env[1201]: time="2025-09-06T01:52:29.412067361Z" level=info msg="TearDown network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" successfully" Sep 6 01:52:29.426089 env[1201]: time="2025-09-06T01:52:29.412144572Z" level=info msg="StopPodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" returns successfully" Sep 6 01:52:29.426089 env[1201]: time="2025-09-06T01:52:29.413357726Z" level=info msg="RemovePodSandbox for \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" Sep 6 01:52:29.426089 env[1201]: time="2025-09-06T01:52:29.413468093Z" level=info msg="Forcibly stopping sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\"" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.595 [WARNING][5368] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"00b78940-5f73-4204-96b1-330a29fc1d16", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"2d20900a2010d180da3fee136e6bde7f641d386b27876d62669adebdfbfb55da", Pod:"coredns-668d6bf9bc-5tx9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6eb2990dd4c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.601 [INFO][5368] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.601 [INFO][5368] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" iface="eth0" netns="" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.602 [INFO][5368] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.602 [INFO][5368] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.866 [INFO][5378] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.868 [INFO][5378] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.869 [INFO][5378] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.914 [WARNING][5378] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.914 [INFO][5378] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" HandleID="k8s-pod-network.1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Workload="srv--lvab0.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5tx9n-eth0" Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.918 [INFO][5378] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:29.923380 env[1201]: 2025-09-06 01:52:29.920 [INFO][5368] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76" Sep 6 01:52:29.932993 env[1201]: time="2025-09-06T01:52:29.924037443Z" level=info msg="TearDown network for sandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" successfully" Sep 6 01:52:29.943991 env[1201]: time="2025-09-06T01:52:29.943920234Z" level=info msg="RemovePodSandbox \"1e42225cfa57d416aeeb44a49e50693cf7df0615246c7a9e6b843db9b4f55d76\" returns successfully" Sep 6 01:52:30.469586 env[1201]: time="2025-09-06T01:52:30.469245608Z" level=info msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:30.923 [WARNING][5394] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"79b17d51-205b-45ba-9310-076cced172a7", ResourceVersion:"1302", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d", Pod:"goldmane-54d579b49d-6ngzs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.83.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicacf0a8e342", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:30.925 [INFO][5394] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:30.925 [INFO][5394] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" iface="eth0" netns="" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:30.925 [INFO][5394] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:30.925 [INFO][5394] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.187 [INFO][5401] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.194 [INFO][5401] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.195 [INFO][5401] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.211 [WARNING][5401] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.211 [INFO][5401] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.216 [INFO][5401] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:31.228562 env[1201]: 2025-09-06 01:52:31.225 [INFO][5394] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.241725 env[1201]: time="2025-09-06T01:52:31.228600323Z" level=info msg="TearDown network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" successfully" Sep 6 01:52:31.241725 env[1201]: time="2025-09-06T01:52:31.228659648Z" level=info msg="StopPodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" returns successfully" Sep 6 01:52:31.314783 kubelet[1976]: E0906 01:52:31.308805 1976 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.429s" Sep 6 01:52:31.362714 env[1201]: time="2025-09-06T01:52:31.362061488Z" level=info msg="RemovePodSandbox for \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" Sep 6 01:52:31.362714 env[1201]: time="2025-09-06T01:52:31.362141328Z" level=info msg="Forcibly stopping sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\"" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.582 [WARNING][5417] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"79b17d51-205b-45ba-9310-076cced172a7", ResourceVersion:"1302", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"6c9c8ca5e328cccb3925b342f75d8d3af54ea30a4468ee33bf7995f293f47a3d", Pod:"goldmane-54d579b49d-6ngzs", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.83.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicacf0a8e342", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.584 [INFO][5417] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.585 [INFO][5417] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" iface="eth0" netns="" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.585 [INFO][5417] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.585 [INFO][5417] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.707 [INFO][5426] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.708 [INFO][5426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.709 [INFO][5426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.741 [WARNING][5426] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.741 [INFO][5426] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" HandleID="k8s-pod-network.827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Workload="srv--lvab0.gb1.brightbox.com-k8s-goldmane--54d579b49d--6ngzs-eth0" Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.761 [INFO][5426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:31.766732 env[1201]: 2025-09-06 01:52:31.764 [INFO][5417] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8" Sep 6 01:52:31.776375 env[1201]: time="2025-09-06T01:52:31.766987999Z" level=info msg="TearDown network for sandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" successfully" Sep 6 01:52:31.781668 env[1201]: time="2025-09-06T01:52:31.781420476Z" level=info msg="RemovePodSandbox \"827715897b7a0c579840eaca1482601428b381956f06514f7f9ac95dfd40eca8\" returns successfully" Sep 6 01:52:31.827225 env[1201]: time="2025-09-06T01:52:31.826149600Z" level=info msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.005 [WARNING][5442] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bbc274-4386-44c8-80ff-be25dc03e0e0", ResourceVersion:"1156", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413", Pod:"csi-node-driver-hx2m2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidec51bfb716", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.006 [INFO][5442] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.006 [INFO][5442] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" iface="eth0" netns="" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.006 [INFO][5442] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.006 [INFO][5442] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.187 [INFO][5449] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.189 [INFO][5449] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.189 [INFO][5449] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.199 [WARNING][5449] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.199 [INFO][5449] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.201 [INFO][5449] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:32.206616 env[1201]: 2025-09-06 01:52:32.204 [INFO][5442] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.211642 env[1201]: time="2025-09-06T01:52:32.206944379Z" level=info msg="TearDown network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" successfully" Sep 6 01:52:32.211642 env[1201]: time="2025-09-06T01:52:32.206990439Z" level=info msg="StopPodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" returns successfully" Sep 6 01:52:32.211642 env[1201]: time="2025-09-06T01:52:32.208186558Z" level=info msg="RemovePodSandbox for \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" Sep 6 01:52:32.211642 env[1201]: time="2025-09-06T01:52:32.208226598Z" level=info msg="Forcibly stopping sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\"" Sep 6 01:52:32.229382 sshd[5331]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:32.276000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:32.277000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:32.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.243.73.226:22-139.178.89.65:59262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:32.284629 systemd[1]: sshd@13-10.243.73.226:22-139.178.89.65:59262.service: Deactivated successfully. Sep 6 01:52:32.295198 systemd[1]: session-14.scope: Deactivated successfully. Sep 6 01:52:32.298730 systemd-logind[1194]: Session 14 logged out. Waiting for processes to exit. Sep 6 01:52:32.306812 systemd-logind[1194]: Removed session 14. Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.460 [WARNING][5463] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68bbc274-4386-44c8-80ff-be25dc03e0e0", ResourceVersion:"1156", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"a4b6ec16f1aba8d34fe7d9e227d200015ad84789ccfb27311b43893a33af9413", Pod:"csi-node-driver-hx2m2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidec51bfb716", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.463 [INFO][5463] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.463 [INFO][5463] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" iface="eth0" netns="" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.466 [INFO][5463] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.466 [INFO][5463] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.514 [INFO][5471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.514 [INFO][5471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.514 [INFO][5471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.527 [WARNING][5471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.527 [INFO][5471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" HandleID="k8s-pod-network.cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Workload="srv--lvab0.gb1.brightbox.com-k8s-csi--node--driver--hx2m2-eth0" Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.530 [INFO][5471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:32.536389 env[1201]: 2025-09-06 01:52:32.533 [INFO][5463] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a" Sep 6 01:52:32.539966 env[1201]: time="2025-09-06T01:52:32.537548087Z" level=info msg="TearDown network for sandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" successfully" Sep 6 01:52:32.549570 env[1201]: time="2025-09-06T01:52:32.546598022Z" level=info msg="RemovePodSandbox \"cd7be94ef904c50c73e6e562fbad00782b1c30d84f7fed3bae6468fc27e35e7a\" returns successfully" Sep 6 01:52:32.550006 env[1201]: time="2025-09-06T01:52:32.549963945Z" level=info msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.609 [WARNING][5486] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"04532c76-6801-4489-bbb9-c2be04557e1b", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3", Pod:"calico-apiserver-7dc7b8776b-m7mdj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06aa67aa1c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.609 [INFO][5486] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.609 [INFO][5486] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" iface="eth0" netns="" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.610 [INFO][5486] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.610 [INFO][5486] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.645 [INFO][5493] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.646 [INFO][5493] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.646 [INFO][5493] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.655 [WARNING][5493] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.655 [INFO][5493] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.657 [INFO][5493] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:32.666837 env[1201]: 2025-09-06 01:52:32.663 [INFO][5486] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.669063 env[1201]: time="2025-09-06T01:52:32.667125400Z" level=info msg="TearDown network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" successfully" Sep 6 01:52:32.669063 env[1201]: time="2025-09-06T01:52:32.667182783Z" level=info msg="StopPodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" returns successfully" Sep 6 01:52:32.669360 env[1201]: time="2025-09-06T01:52:32.669315730Z" level=info msg="RemovePodSandbox for \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" Sep 6 01:52:32.669577 env[1201]: time="2025-09-06T01:52:32.669513661Z" level=info msg="Forcibly stopping sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\"" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.735 [WARNING][5508] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0", GenerateName:"calico-apiserver-7dc7b8776b-", Namespace:"calico-apiserver", SelfLink:"", UID:"04532c76-6801-4489-bbb9-c2be04557e1b", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dc7b8776b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"62c954ce25b2955e5e931d437ea3a92a5ae484b4b6cbe3e5c0750389a90b7fb3", Pod:"calico-apiserver-7dc7b8776b-m7mdj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06aa67aa1c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.735 [INFO][5508] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.735 [INFO][5508] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" iface="eth0" netns="" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.735 [INFO][5508] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.736 [INFO][5508] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.781 [INFO][5515] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.781 [INFO][5515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.781 [INFO][5515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.789 [WARNING][5515] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.789 [INFO][5515] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" HandleID="k8s-pod-network.e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--apiserver--7dc7b8776b--m7mdj-eth0" Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.791 [INFO][5515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:32.796748 env[1201]: 2025-09-06 01:52:32.793 [INFO][5508] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0" Sep 6 01:52:32.801798 env[1201]: time="2025-09-06T01:52:32.797031979Z" level=info msg="TearDown network for sandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" successfully" Sep 6 01:52:32.803622 env[1201]: time="2025-09-06T01:52:32.803552771Z" level=info msg="RemovePodSandbox \"e39f35e4353f7a6681740f35392334bfb9417c87eac0cd2f9a81b5d2ceafd5d0\" returns successfully" Sep 6 01:52:32.804513 env[1201]: time="2025-09-06T01:52:32.804451254Z" level=info msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.863 [WARNING][5529] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0", GenerateName:"calico-kube-controllers-798f59b8c7-", Namespace:"calico-system", SelfLink:"", UID:"7a0bb70b-816e-46fb-960c-13508504a78b", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"798f59b8c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c", Pod:"calico-kube-controllers-798f59b8c7-m4nnq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c07aff7a9c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.863 [INFO][5529] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.863 [INFO][5529] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" iface="eth0" netns="" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.863 [INFO][5529] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.863 [INFO][5529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.916 [INFO][5536] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.916 [INFO][5536] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.916 [INFO][5536] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.931 [WARNING][5536] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.931 [INFO][5536] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.943 [INFO][5536] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:32.947600 env[1201]: 2025-09-06 01:52:32.945 [INFO][5529] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:32.949845 env[1201]: time="2025-09-06T01:52:32.947650469Z" level=info msg="TearDown network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" successfully" Sep 6 01:52:32.949845 env[1201]: time="2025-09-06T01:52:32.947694354Z" level=info msg="StopPodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" returns successfully" Sep 6 01:52:32.949845 env[1201]: time="2025-09-06T01:52:32.948884459Z" level=info msg="RemovePodSandbox for \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" Sep 6 01:52:32.949845 env[1201]: time="2025-09-06T01:52:32.948924893Z" level=info msg="Forcibly stopping sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\"" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.023 [WARNING][5552] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0", GenerateName:"calico-kube-controllers-798f59b8c7-", Namespace:"calico-system", SelfLink:"", UID:"7a0bb70b-816e-46fb-960c-13508504a78b", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.September, 6, 1, 50, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"798f59b8c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-lvab0.gb1.brightbox.com", ContainerID:"30962e21e9bb3a021a8fe5f0b5da8322662f8db6806b83da1e1df3f50f4b667c", Pod:"calico-kube-controllers-798f59b8c7-m4nnq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7c07aff7a9c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.024 [INFO][5552] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.024 [INFO][5552] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" iface="eth0" netns="" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.024 [INFO][5552] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.024 [INFO][5552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.079 [INFO][5559] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.079 [INFO][5559] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.079 [INFO][5559] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.112 [WARNING][5559] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.112 [INFO][5559] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" HandleID="k8s-pod-network.93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Workload="srv--lvab0.gb1.brightbox.com-k8s-calico--kube--controllers--798f59b8c7--m4nnq-eth0" Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.115 [INFO][5559] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:33.120082 env[1201]: 2025-09-06 01:52:33.117 [INFO][5552] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888" Sep 6 01:52:33.120082 env[1201]: time="2025-09-06T01:52:33.120054651Z" level=info msg="TearDown network for sandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" successfully" Sep 6 01:52:33.127920 env[1201]: time="2025-09-06T01:52:33.127862818Z" level=info msg="RemovePodSandbox \"93a2be0a4df095be1b4433a614e2ecdefa4b732ac748e587db67f7f4e8e22888\" returns successfully" Sep 6 01:52:33.128744 env[1201]: time="2025-09-06T01:52:33.128688104Z" level=info msg="StopPodSandbox for \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\"" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.221 [WARNING][5573] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.221 [INFO][5573] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.221 [INFO][5573] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" iface="eth0" netns="" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.221 [INFO][5573] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.221 [INFO][5573] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.260 [INFO][5580] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.261 [INFO][5580] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.261 [INFO][5580] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.270 [WARNING][5580] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.270 [INFO][5580] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.277 [INFO][5580] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:33.282010 env[1201]: 2025-09-06 01:52:33.279 [INFO][5573] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.282863 env[1201]: time="2025-09-06T01:52:33.282060854Z" level=info msg="TearDown network for sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" successfully" Sep 6 01:52:33.282863 env[1201]: time="2025-09-06T01:52:33.282107376Z" level=info msg="StopPodSandbox for \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" returns successfully" Sep 6 01:52:33.283280 env[1201]: time="2025-09-06T01:52:33.283237563Z" level=info msg="RemovePodSandbox for \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\"" Sep 6 01:52:33.283368 env[1201]: time="2025-09-06T01:52:33.283295523Z" level=info msg="Forcibly stopping sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\"" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.381 [WARNING][5594] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" WorkloadEndpoint="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.381 [INFO][5594] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.381 [INFO][5594] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" iface="eth0" netns="" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.382 [INFO][5594] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.382 [INFO][5594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.426 [INFO][5601] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.427 [INFO][5601] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.427 [INFO][5601] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.438 [WARNING][5601] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.438 [INFO][5601] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" HandleID="k8s-pod-network.0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Workload="srv--lvab0.gb1.brightbox.com-k8s-whisker--6c65c9557f--zhn44-eth0" Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.440 [INFO][5601] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 6 01:52:33.445395 env[1201]: 2025-09-06 01:52:33.442 [INFO][5594] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af" Sep 6 01:52:33.445395 env[1201]: time="2025-09-06T01:52:33.445358549Z" level=info msg="TearDown network for sandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" successfully" Sep 6 01:52:33.453079 env[1201]: time="2025-09-06T01:52:33.453039390Z" level=info msg="RemovePodSandbox \"0c47cce8060424790778bf1f64dfa38a4b0e1851beb80fd0d0f72665f9fad3af\" returns successfully" Sep 6 01:52:34.838000 audit[4530]: AVC avc: denied { watch } for pid=4530 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_51_00.2741231142/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c530 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c134,c530 tclass=file permissive=0 Sep 6 01:52:34.852467 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 6 01:52:34.853870 kernel: audit: type=1400 audit(1757123554.838:1601): avc: denied { watch } for pid=4530 comm="apiserver" path="/calico-apiserver-certs/..2025_09_06_01_51_00.2741231142/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c530 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c134,c530 tclass=file permissive=0 Sep 6 01:52:34.838000 audit[4530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001658c20 a2=fc6 a3=0 items=0 ppid=4477 pid=4530 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c530 key=(null) Sep 6 01:52:34.869508 kernel: audit: type=1300 audit(1757123554.838:1601): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001658c20 a2=fc6 a3=0 items=0 ppid=4477 pid=4530 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c530 key=(null) Sep 6 01:52:34.869913 kernel: audit: type=1327 audit(1757123554.838:1601): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:52:34.838000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 6 01:52:37.394171 systemd[1]: Started sshd@14-10.243.73.226:22-139.178.89.65:51074.service. Sep 6 01:52:37.411086 kernel: audit: type=1130 audit(1757123557.394:1602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.243.73.226:22-139.178.89.65:51074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:37.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.243.73.226:22-139.178.89.65:51074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:38.435000 audit[5609]: USER_ACCT pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:38.463519 kernel: audit: type=1101 audit(1757123558.435:1603): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:38.466254 sshd[5609]: Accepted publickey for core from 139.178.89.65 port 51074 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:38.470129 sshd[5609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:38.465000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:38.488535 kernel: audit: type=1103 audit(1757123558.465:1604): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:38.497864 kernel: audit: type=1006 audit(1757123558.465:1605): pid=5609 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Sep 6 01:52:38.497981 kernel: audit: type=1300 audit(1757123558.465:1605): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd932519f0 a2=3 a3=0 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:38.465000 audit[5609]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd932519f0 a2=3 a3=0 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:38.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:38.507585 kernel: audit: type=1327 audit(1757123558.465:1605): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:38.524231 systemd-logind[1194]: New session 15 of user core. Sep 6 01:52:38.528499 systemd[1]: Started session-15.scope. Sep 6 01:52:38.537000 audit[5609]: USER_START pid=5609 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:38.548508 kernel: audit: type=1105 audit(1757123558.537:1606): pid=5609 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:38.546000 audit[5611]: CRED_ACQ pid=5611 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:39.796574 sshd[5609]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:39.796000 audit[5609]: USER_END pid=5609 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:39.797000 audit[5609]: CRED_DISP pid=5609 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:39.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.243.73.226:22-139.178.89.65:51074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:39.800961 systemd-logind[1194]: Session 15 logged out. Waiting for processes to exit. Sep 6 01:52:39.801340 systemd[1]: sshd@14-10.243.73.226:22-139.178.89.65:51074.service: Deactivated successfully. Sep 6 01:52:39.802619 systemd[1]: session-15.scope: Deactivated successfully. Sep 6 01:52:39.807504 systemd-logind[1194]: Removed session 15. Sep 6 01:52:39.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.243.73.226:22-139.178.89.65:51076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:39.935348 systemd[1]: Started sshd@15-10.243.73.226:22-139.178.89.65:51076.service. Sep 6 01:52:39.939508 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 6 01:52:39.940952 kernel: audit: type=1130 audit(1757123559.934:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.243.73.226:22-139.178.89.65:51076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:40.862000 audit[5625]: USER_ACCT pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.865753 sshd[5625]: Accepted publickey for core from 139.178.89.65 port 51076 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:40.871515 kernel: audit: type=1101 audit(1757123560.862:1612): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.872553 sshd[5625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:40.869000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.889220 kernel: audit: type=1103 audit(1757123560.869:1613): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.889323 kernel: audit: type=1006 audit(1757123560.869:1614): pid=5625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Sep 6 01:52:40.869000 audit[5625]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32993980 a2=3 a3=0 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:40.891856 systemd[1]: Started session-16.scope. Sep 6 01:52:40.897305 kernel: audit: type=1300 audit(1757123560.869:1614): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32993980 a2=3 a3=0 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:40.896555 systemd-logind[1194]: New session 16 of user core. Sep 6 01:52:40.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:40.901622 kernel: audit: type=1327 audit(1757123560.869:1614): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:40.908000 audit[5625]: USER_START pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.918560 kernel: audit: type=1105 audit(1757123560.908:1615): pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.918000 audit[5629]: CRED_ACQ pid=5629 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:40.926612 kernel: audit: type=1103 audit(1757123560.918:1616): pid=5629 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:42.108636 sshd[5625]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:42.118000 audit[5625]: USER_END pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:42.130650 kernel: audit: type=1106 audit(1757123562.118:1617): pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:42.131000 audit[5625]: CRED_DISP pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:42.135389 systemd[1]: sshd@15-10.243.73.226:22-139.178.89.65:51076.service: Deactivated successfully. Sep 6 01:52:42.144037 kernel: audit: type=1104 audit(1757123562.131:1618): pid=5625 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:42.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.243.73.226:22-139.178.89.65:51076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:42.136682 systemd[1]: session-16.scope: Deactivated successfully. Sep 6 01:52:42.139402 systemd-logind[1194]: Session 16 logged out. Waiting for processes to exit. Sep 6 01:52:42.140832 systemd-logind[1194]: Removed session 16. Sep 6 01:52:42.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.243.73.226:22-139.178.89.65:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:42.256663 systemd[1]: Started sshd@16-10.243.73.226:22-139.178.89.65:34986.service. Sep 6 01:52:43.182000 audit[5657]: USER_ACCT pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:43.184913 sshd[5657]: Accepted publickey for core from 139.178.89.65 port 34986 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:43.185000 audit[5657]: CRED_ACQ pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:43.185000 audit[5657]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe18c36c20 a2=3 a3=0 items=0 ppid=1 pid=5657 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:43.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:43.189448 sshd[5657]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:43.199229 systemd-logind[1194]: New session 17 of user core. Sep 6 01:52:43.199712 systemd[1]: Started session-17.scope. Sep 6 01:52:43.210000 audit[5657]: USER_START pid=5657 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:43.212000 audit[5660]: CRED_ACQ pid=5660 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:45.100694 sshd[5657]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:45.129935 kernel: kauditd_printk_skb: 9 callbacks suppressed Sep 6 01:52:45.131647 kernel: audit: type=1106 audit(1757123565.115:1626): pid=5657 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:45.115000 audit[5657]: USER_END pid=5657 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:45.144464 systemd[1]: sshd@16-10.243.73.226:22-139.178.89.65:34986.service: Deactivated successfully. Sep 6 01:52:45.129000 audit[5657]: CRED_DISP pid=5657 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:45.151515 kernel: audit: type=1104 audit(1757123565.129:1627): pid=5657 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:45.154217 systemd[1]: session-17.scope: Deactivated successfully. Sep 6 01:52:45.156943 systemd-logind[1194]: Session 17 logged out. Waiting for processes to exit. Sep 6 01:52:45.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.243.73.226:22-139.178.89.65:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:45.161092 systemd-logind[1194]: Removed session 17. Sep 6 01:52:45.167073 kernel: audit: type=1131 audit(1757123565.151:1628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.243.73.226:22-139.178.89.65:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:45.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.243.73.226:22-139.178.89.65:34996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:45.248865 systemd[1]: Started sshd@17-10.243.73.226:22-139.178.89.65:34996.service. Sep 6 01:52:45.257323 kernel: audit: type=1130 audit(1757123565.247:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.243.73.226:22-139.178.89.65:34996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:45.285000 audit[5688]: NETFILTER_CFG table=filter:139 family=2 entries=20 op=nft_register_rule pid=5688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:45.285000 audit[5688]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff1bd41300 a2=0 a3=7fff1bd412ec items=0 ppid=2097 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:45.304874 kernel: audit: type=1325 audit(1757123565.285:1630): table=filter:139 family=2 entries=20 op=nft_register_rule pid=5688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:45.304985 kernel: audit: type=1300 audit(1757123565.285:1630): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff1bd41300 a2=0 a3=7fff1bd412ec items=0 ppid=2097 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:45.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:45.314570 kernel: audit: type=1327 audit(1757123565.285:1630): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:45.311000 audit[5688]: NETFILTER_CFG table=nat:140 family=2 entries=26 op=nft_register_rule pid=5688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:45.332509 kernel: audit: type=1325 audit(1757123565.311:1631): table=nat:140 family=2 entries=26 op=nft_register_rule pid=5688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:45.311000 audit[5688]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff1bd41300 a2=0 a3=0 items=0 ppid=2097 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:45.342533 kernel: audit: type=1300 audit(1757123565.311:1631): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fff1bd41300 a2=0 a3=0 items=0 ppid=2097 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:45.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:45.350516 kernel: audit: type=1327 audit(1757123565.311:1631): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:45.369000 audit[5695]: NETFILTER_CFG table=filter:141 family=2 entries=32 op=nft_register_rule pid=5695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:45.369000 audit[5695]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc821107f0 a2=0 a3=7ffc821107dc items=0 ppid=2097 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:45.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:45.375000 audit[5695]: NETFILTER_CFG table=nat:142 family=2 entries=26 op=nft_register_rule pid=5695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:45.375000 audit[5695]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc821107f0 a2=0 a3=0 items=0 ppid=2097 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:45.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:45.720558 systemd[1]: run-containerd-runc-k8s.io-b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f-runc.eYxmdp.mount: Deactivated successfully. Sep 6 01:52:46.127813 systemd[1]: run-containerd-runc-k8s.io-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac-runc.mSwFjY.mount: Deactivated successfully. Sep 6 01:52:46.221000 audit[5687]: USER_ACCT pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:46.224559 sshd[5687]: Accepted publickey for core from 139.178.89.65 port 34996 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:46.224000 audit[5687]: CRED_ACQ pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:46.224000 audit[5687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1cfdc5b0 a2=3 a3=0 items=0 ppid=1 pid=5687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:46.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:46.228269 sshd[5687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:46.250843 systemd-logind[1194]: New session 18 of user core. Sep 6 01:52:46.256628 systemd[1]: Started session-18.scope. Sep 6 01:52:46.265000 audit[5687]: USER_START pid=5687 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:46.268000 audit[5733]: CRED_ACQ pid=5733 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:47.859580 sshd[5687]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:47.874000 audit[5687]: USER_END pid=5687 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:47.875000 audit[5687]: CRED_DISP pid=5687 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:47.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.243.73.226:22-139.178.89.65:34996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:47.890110 systemd[1]: sshd@17-10.243.73.226:22-139.178.89.65:34996.service: Deactivated successfully. Sep 6 01:52:47.892522 systemd[1]: session-18.scope: Deactivated successfully. Sep 6 01:52:47.895010 systemd-logind[1194]: Session 18 logged out. Waiting for processes to exit. Sep 6 01:52:47.897731 systemd-logind[1194]: Removed session 18. Sep 6 01:52:47.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.243.73.226:22-139.178.89.65:35012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:47.998818 systemd[1]: Started sshd@18-10.243.73.226:22-139.178.89.65:35012.service. Sep 6 01:52:48.956000 audit[5745]: USER_ACCT pid=5745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:48.959333 sshd[5745]: Accepted publickey for core from 139.178.89.65 port 35012 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:48.958000 audit[5745]: CRED_ACQ pid=5745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:48.958000 audit[5745]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b2d0590 a2=3 a3=0 items=0 ppid=1 pid=5745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:48.958000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:48.963847 sshd[5745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:48.981167 systemd-logind[1194]: New session 19 of user core. Sep 6 01:52:48.981957 systemd[1]: Started session-19.scope. Sep 6 01:52:48.993000 audit[5745]: USER_START pid=5745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:48.995000 audit[5747]: CRED_ACQ pid=5747 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:50.051648 sshd[5745]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:50.053000 audit[5745]: USER_END pid=5745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:50.054000 audit[5745]: CRED_DISP pid=5745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:50.058695 systemd[1]: sshd@18-10.243.73.226:22-139.178.89.65:35012.service: Deactivated successfully. Sep 6 01:52:50.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.243.73.226:22-139.178.89.65:35012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:50.059761 systemd[1]: session-19.scope: Deactivated successfully. Sep 6 01:52:50.061192 systemd-logind[1194]: Session 19 logged out. Waiting for processes to exit. Sep 6 01:52:50.062913 systemd-logind[1194]: Removed session 19. Sep 6 01:52:55.207657 systemd[1]: Started sshd@19-10.243.73.226:22-139.178.89.65:58900.service. Sep 6 01:52:55.226407 kernel: kauditd_printk_skb: 27 callbacks suppressed Sep 6 01:52:55.232731 kernel: audit: type=1130 audit(1757123575.207:1651): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.243.73.226:22-139.178.89.65:58900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:55.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.243.73.226:22-139.178.89.65:58900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:56.190000 audit[5778]: USER_ACCT pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.201946 sshd[5778]: Accepted publickey for core from 139.178.89.65 port 58900 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:52:56.205500 kernel: audit: type=1101 audit(1757123576.190:1652): pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.205000 audit[5778]: CRED_ACQ pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.212761 sshd[5778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:52:56.217760 kernel: audit: type=1103 audit(1757123576.205:1653): pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.229500 kernel: audit: type=1006 audit(1757123576.205:1654): pid=5778 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Sep 6 01:52:56.239439 systemd-logind[1194]: New session 20 of user core. Sep 6 01:52:56.205000 audit[5778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e1f51e0 a2=3 a3=0 items=0 ppid=1 pid=5778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:56.240322 systemd[1]: Started session-20.scope. Sep 6 01:52:56.247494 kernel: audit: type=1300 audit(1757123576.205:1654): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e1f51e0 a2=3 a3=0 items=0 ppid=1 pid=5778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:56.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:56.250628 kernel: audit: type=1327 audit(1757123576.205:1654): proctitle=737368643A20636F7265205B707269765D Sep 6 01:52:56.256000 audit[5778]: USER_START pid=5778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.265532 kernel: audit: type=1105 audit(1757123576.256:1655): pid=5778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.266000 audit[5780]: CRED_ACQ pid=5780 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:56.277718 kernel: audit: type=1103 audit(1757123576.266:1656): pid=5780 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:57.418520 sshd[5778]: pam_unix(sshd:session): session closed for user core Sep 6 01:52:57.420000 audit[5778]: USER_END pid=5778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:57.439493 kernel: audit: type=1106 audit(1757123577.420:1657): pid=5778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:57.431141 systemd[1]: sshd@19-10.243.73.226:22-139.178.89.65:58900.service: Deactivated successfully. Sep 6 01:52:57.440801 systemd[1]: session-20.scope: Deactivated successfully. Sep 6 01:52:57.441897 systemd-logind[1194]: Session 20 logged out. Waiting for processes to exit. Sep 6 01:52:57.446721 systemd-logind[1194]: Removed session 20. Sep 6 01:52:57.420000 audit[5778]: CRED_DISP pid=5778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:57.453792 kernel: audit: type=1104 audit(1757123577.420:1658): pid=5778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:52:57.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.243.73.226:22-139.178.89.65:58900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:52:58.976000 audit[5790]: NETFILTER_CFG table=filter:143 family=2 entries=20 op=nft_register_rule pid=5790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:58.976000 audit[5790]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc1c1aa090 a2=0 a3=7ffc1c1aa07c items=0 ppid=2097 pid=5790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:58.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:52:58.984000 audit[5790]: NETFILTER_CFG table=nat:144 family=2 entries=110 op=nft_register_chain pid=5790 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 6 01:52:58.984000 audit[5790]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc1c1aa090 a2=0 a3=7ffc1c1aa07c items=0 ppid=2097 pid=5790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:52:58.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 6 01:53:02.592138 systemd[1]: Started sshd@20-10.243.73.226:22-139.178.89.65:36158.service. Sep 6 01:53:02.605214 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 6 01:53:02.605545 kernel: audit: type=1130 audit(1757123582.593:1662): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.243.73.226:22-139.178.89.65:36158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:53:02.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.243.73.226:22-139.178.89.65:36158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:53:03.625000 audit[5794]: USER_ACCT pid=5794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.636590 sshd[5794]: Accepted publickey for core from 139.178.89.65 port 36158 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:53:03.639289 kernel: audit: type=1101 audit(1757123583.625:1663): pid=5794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.639000 audit[5794]: CRED_ACQ pid=5794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.643389 sshd[5794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:53:03.647553 kernel: audit: type=1103 audit(1757123583.639:1664): pid=5794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.653499 kernel: audit: type=1006 audit(1757123583.639:1665): pid=5794 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Sep 6 01:53:03.654668 kernel: audit: type=1300 audit(1757123583.639:1665): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd522296c0 a2=3 a3=0 items=0 ppid=1 pid=5794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:53:03.639000 audit[5794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd522296c0 a2=3 a3=0 items=0 ppid=1 pid=5794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:53:03.660971 kernel: audit: type=1327 audit(1757123583.639:1665): proctitle=737368643A20636F7265205B707269765D Sep 6 01:53:03.639000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:53:03.666775 systemd-logind[1194]: New session 21 of user core. Sep 6 01:53:03.668983 systemd[1]: Started session-21.scope. Sep 6 01:53:03.681000 audit[5794]: USER_START pid=5794 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.690692 kernel: audit: type=1105 audit(1757123583.681:1666): pid=5794 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.690809 kernel: audit: type=1103 audit(1757123583.688:1667): pid=5796 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:03.688000 audit[5796]: CRED_ACQ pid=5796 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:04.903559 sshd[5794]: pam_unix(sshd:session): session closed for user core Sep 6 01:53:04.904000 audit[5794]: USER_END pid=5794 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:04.917506 kernel: audit: type=1106 audit(1757123584.904:1668): pid=5794 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:04.917520 systemd[1]: sshd@20-10.243.73.226:22-139.178.89.65:36158.service: Deactivated successfully. Sep 6 01:53:04.919326 systemd[1]: session-21.scope: Deactivated successfully. Sep 6 01:53:04.920687 systemd-logind[1194]: Session 21 logged out. Waiting for processes to exit. Sep 6 01:53:04.924407 systemd-logind[1194]: Removed session 21. Sep 6 01:53:04.904000 audit[5794]: CRED_DISP pid=5794 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:04.944506 kernel: audit: type=1104 audit(1757123584.904:1669): pid=5794 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:04.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.243.73.226:22-139.178.89.65:36158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:53:10.196620 systemd[1]: Started sshd@21-10.243.73.226:22-139.178.89.65:36172.service. Sep 6 01:53:10.312059 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 6 01:53:10.378734 kernel: audit: type=1130 audit(1757123590.198:1671): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.243.73.226:22-139.178.89.65:36172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:53:10.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.243.73.226:22-139.178.89.65:36172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:53:11.660179 systemd[1]: run-containerd-runc-k8s.io-80b819dd1af3fb8505d7035449412f8ec5c15ab666f481017e82311da0463ff0-runc.oWFNB9.mount: Deactivated successfully. Sep 6 01:53:11.792000 audit[5827]: USER_ACCT pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.815912 kernel: audit: type=1101 audit(1757123591.792:1672): pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.822364 kernel: audit: type=1103 audit(1757123591.814:1673): pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.814000 audit[5827]: CRED_ACQ pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.827564 kernel: audit: type=1006 audit(1757123591.814:1674): pid=5827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Sep 6 01:53:11.827642 sshd[5827]: Accepted publickey for core from 139.178.89.65 port 36172 ssh2: RSA SHA256:8Jg6bi6M/j5fwJksmVOnJI1ducBJE/3+ZbOFydKh6RQ Sep 6 01:53:11.843052 kernel: audit: type=1300 audit(1757123591.814:1674): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe604d4500 a2=3 a3=0 items=0 ppid=1 pid=5827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:53:11.814000 audit[5827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe604d4500 a2=3 a3=0 items=0 ppid=1 pid=5827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 6 01:53:11.859040 kernel: audit: type=1327 audit(1757123591.814:1674): proctitle=737368643A20636F7265205B707269765D Sep 6 01:53:11.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 6 01:53:11.821333 sshd[5827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 6 01:53:11.857180 systemd-logind[1194]: New session 22 of user core. Sep 6 01:53:11.859346 systemd[1]: Started session-22.scope. Sep 6 01:53:11.868000 audit[5827]: USER_START pid=5827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.877505 kernel: audit: type=1105 audit(1757123591.868:1675): pid=5827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.868000 audit[5845]: CRED_ACQ pid=5845 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:11.883695 kernel: audit: type=1103 audit(1757123591.868:1676): pid=5845 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:13.786976 sshd[5827]: pam_unix(sshd:session): session closed for user core Sep 6 01:53:13.817857 kernel: audit: type=1106 audit(1757123593.791:1677): pid=5827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:13.791000 audit[5827]: USER_END pid=5827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:13.791000 audit[5827]: CRED_DISP pid=5827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:13.811615 systemd[1]: sshd@21-10.243.73.226:22-139.178.89.65:36172.service: Deactivated successfully. Sep 6 01:53:13.813313 systemd[1]: session-22.scope: Deactivated successfully. Sep 6 01:53:13.825584 kernel: audit: type=1104 audit(1757123593.791:1678): pid=5827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 6 01:53:13.819162 systemd-logind[1194]: Session 22 logged out. Waiting for processes to exit. Sep 6 01:53:13.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.243.73.226:22-139.178.89.65:36172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 6 01:53:13.828992 systemd-logind[1194]: Removed session 22. Sep 6 01:53:15.735607 systemd[1]: run-containerd-runc-k8s.io-b008110af1436c09271845369e40bc78c3853e8dc846185ecfd0a8c8a71e9c6f-runc.PjtJsj.mount: Deactivated successfully. Sep 6 01:53:16.135849 systemd[1]: run-containerd-runc-k8s.io-d0fa08dd79cb1e97f1eaf1cddf91aa272b7993f56c5f1f57cac144612b222cac-runc.LDBj0B.mount: Deactivated successfully.